last executing test programs: 28m22.047474041s ago: executing program 32 (id=922): socket$inet6_tcp(0xa, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="19000000040000000400000008"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x7, 0x7fe2, 0x3}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1, 0xf, 0x6, 0x9, 0x0, r1, 0x100}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r2, 0xd}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0xd07, 0x40}, 0x100b28, 0x6, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) symlink(&(0x7f0000000540)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000800)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_SEC_LEVEL(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)={0x14, r4, 0x701, 0x74bd2b, 0x0, {0x5}}, 0x14}, 0x1, 0x0, 0x0, 0x20004074}, 0x0) 21m21.906052513s ago: executing program 33 (id=9104): r0 = memfd_create(&(0x7f00000001c0)='\x00\xc76\xbe\x91\x8d\x182)!\x9a%\xd9\x19\x17\xb0\xed|\xb3\xc2\x017h\xe9kL\xa2\xd28\xd6\x06\a\x0e\xfc\xfe\x12\x8f&\x13\xae%@T\xa3\xb0>\\\xec\xa9\xf9Q@6A\x10\x8cn|\x00\x00\x00\x00\x00\x00\x00\x00\xeb0\xdd\xe8\x87\x05=\xfb\x8b$\xdcQ\xee\xc5\x1f\x8bQ\xf7fo\"i\xa1hk\x1d\xf5z\xc1\x7f\xa4\\]\xc4\xbe3\xf9\xa8\t?:\xd8\xda\x84\xeepI[\x1c\x00\x00\x00\x00\xf9v\x00\x00\x00\x00\x00T\xb6\xbe\x0f~\xc0\x92\xe9O{\xa8\x81(\x01\x14\xfc\x83\xf9\xfb\x05\x94Tr@Lq]\xf9\x15zj\x87\xc4\x8e\xe8/\xb9-&R\x8e\xb2\xb3bBx\x1e1\x18\x8f2\xf7]#\xed,\xc7\x03\x00\x00\x00\xa3\xee\xcb\xaf\xb3\xe3\'}\x18\xe8O\xa8#K\xb6\xe4R$\xaa\x00U\x92\xd2\x99\xb80xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000002c0), 0x400000) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, &(0x7f00000003c0)={0x3, 0x80, 0x6, 0xc43, 0x8, 0x9}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x18) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfa, 0x0, 0xe4}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r4, &(0x7f0000002980)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000880)="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", 0x2fb}], 0x1}}], 0x1, 0x480e0) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000600)=0xdfa, 0x4) sendto$inet(r4, &(0x7f0000000580)="17", 0x59a, 0x10008095, 0x0, 0x0) 10m2.25555927s ago: executing program 35 (id=20825): bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xf3, 0x0, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f", 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r0 = creat(&(0x7f0000010280)='./file0\x00', 0x182) mount(&(0x7f00000001c0), &(0x7f0000000440)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000900)='trans=tcp,') socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000006c59850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000f00)='kfree\x00', r1}, 0x18) socket$nl_netfilter(0x10, 0x3, 0xc) pipe(&(0x7f0000000000)) r2 = socket$inet(0x2, 0x3, 0xd) getsockopt$inet_mreqsrc(r2, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000040)=0x2c) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setreuid(0xee01, 0x0) r4 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_mtu(r4, 0x0, 0x19, 0x0, 0x0) r5 = gettid() seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6, 0x4, 0x7, 0x50000}]}) syz_clone(0xb44040, 0x0, 0x0, 0x0, 0x0, 0x0) rt_sigaction(0x1b, &(0x7f0000000040)={0xfffffffffffffffc, 0x4c000000, 0x0, {[0x8000000000005a]}}, 0x0, 0x8, &(0x7f00000001c0)) tkill(r5, 0x1b) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000340), &(0x7f0000000380)=0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a3c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc140000001100010000000000000000000100000a6f17f66c4b7e625f873a160e87c037e53dd2b209961e2db9d196948e"], 0x64}, 0x1, 0x0, 0x0, 0x94}, 0x24000000) sendmsg$NFT_BATCH(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x240040d0}, 0x0) 2m7.230353057s ago: executing program 36 (id=28366): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1342, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000100)={0x28, 0x0, 0x0, @local}, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) 1m57.166884019s ago: executing program 8 (id=28423): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x201, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x7}, 0x100, 0xa88, 0x8406, 0x5, 0x0, 0x3c, 0xffff, 0x0, 0x0, 0x0, 0x46}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000440)={0x6, 0x80, 0x0, 0x0, 0xf8, 0xfa, 0x0, 0x0, 0x52024, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffff00000001, 0x1ff}, 0x0, 0x6, 0xffffffff, 0x0, 0x6, 0x0, 0x4}, 0x0, 0xe, 0xffffffffffffffff, 0x1) r0 = socket$igmp(0x2, 0x3, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x30, 0x0, 0x0) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, 0x0, 0x0) setsockopt$MRT_ADD_MFC_PROXY(r0, 0x0, 0xd2, &(0x7f0000000280)={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x1, "614af285791a63abd0f993af8077b5cd01e03d64a831683fdc3fd440829c82ae", 0x100, 0x0, 0x0, 0x4}, 0x3c) r2 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x1}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r3, &(0x7f0000001240)=""/102400, 0x200000, 0x0) ioctl$LOOP_SET_CAPACITY(r3, 0x4c07) socket$packet(0x11, 0x2, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x200}, 0x4) write(r2, &(0x7f0000000000)="240000001a005f0214f9f407000904001f00000000000000000000000800040001000000", 0x24) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x5c, 0x2, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x0}, @IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8040}, 0x4004010) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x5, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) r6 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0xa401) ioctl$USBDEVFS_SUBMITURB(r6, 0x8038550a, &(0x7f0000000140)=@urb_type_control={0x2, {}, 0x3, 0x1, &(0x7f0000000240)={0xa1, 0x0, 0x0, 0x4}, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0}) 1m55.687565564s ago: executing program 8 (id=28437): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d0000008500000007000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4c, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) move_pages(0x0, 0x1efe, &(0x7f0000000080), 0x0, &(0x7f0000000040), 0x0) r2 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={0x400000, 0x21, 0x37}, 0x18) getdents(r2, &(0x7f00000003c0)=""/99, 0x63) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, 0x0, 0x0) dup2(r3, r3) r4 = getpid() syz_pidfd_open(r4, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r5 = getpid() sched_setscheduler(r5, 0x2, &(0x7f00000005c0)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r6, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r8 = syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$VT_DISALLOCATE(r8, 0x5608) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[], 0x0}, 0x94) syz_clone(0xe2840480, 0x0, 0x0, 0x0, 0x0, 0x0) 1m53.007552526s ago: executing program 8 (id=28450): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="1801000000000000000000006dfeff00850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r0, 0x0, 0x401}, 0x18) r1 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) bind$llc(r1, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x10) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7fff7ffb}]}) close_range(r2, 0xffffffffffffffff, 0x0) 1m52.957618721s ago: executing program 8 (id=28451): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @sk_msg}, 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x58, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) write(r0, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x180, 0x0) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000280)) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000700)=ANY=[@ANYBLOB="0c0100001a0007000000000000000000fe80000000000000000000000000001be0000002000000000000000000000000ffff0000000000000000000002000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="0001000000002b000000fc000000000000000000000000000000000300000000000003000000000000000200000000000000000000007ffffffe00"/98], 0x10c}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000006c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r8}, 0x10) timerfd_settime(0xffffffffffffffff, 0x3, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) r9 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x1) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000480)={'syztnl1\x00', &(0x7f0000000400)={'ip6_vti0\x00', 0x0, 0x4, 0xf, 0x0, 0x9, 0x40, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private0, 0x700, 0x7847, 0x0, 0x69}}) r11 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./bus\x00', 0x289c2, 0x1) fcntl$setlease(r11, 0x400, 0x1) fremovexattr(r11, &(0x7f0000000040)=@known='system.posix_acl_default\x00') r12 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000001f00)=ANY=[@ANYBLOB="9feb01001800000000000000370100003701000004000000010000400000000b00f0ff00100000000000000b000000000500000005000013090000000f00000000000000e406000011000000600000000200000005000000070000001b0000000c00000007000000000000000800000007000000760e00000800000000000012030000100e0000000000000e0500000000000000000000000000000d000000000000000000000003000000000400000003e8ffff7e00000006000000080000060400000002000000060000000a0000000800000007000000030000000e000000ff7f000004000000992700000e0000000100000000000000060000000600000008000000080000000500000f03000000010000000100000004000000050000002100000003000000020000000200000003000000050000000c0000000800000002000000be00000002000000d901fe000030300045a09dde63581023a631c887e4aef726da4fda161ca011893bc4e44aa6fca4c69b036c2725a282bb04c7f14bbf8faff21484a1c1d6897f14"], &(0x7f0000000a00)=""/4096, 0x154, 0x1000, 0x0, 0x1, 0x10000, @value=r11}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r4, 0xe0, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780), ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f00000007c0)=[0x0, 0x0], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xc0, &(0x7f0000000840), 0x0, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0x80, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001b80)={0x15, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000005000000000000000700000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000003086f0fff0ffffff1f043000fcffffffbf91000000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x1, 0x8b, &(0x7f0000000340)=""/139, 0x40f00, 0x28, '\x00', r10, @fallback=0x10, r12, 0x8, &(0x7f0000000700)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000740)={0x5, 0x8, 0x7, 0xfffffff7}, 0x10, r13, r4, 0x8, &(0x7f0000000980)=[r3, r3], &(0x7f0000001b00)=[{0x0, 0x3, 0xc, 0x7}, {0x5, 0x1, 0xf, 0x6}, {0x5, 0x2, 0xe, 0xa}, {0xe1, 0x5, 0x3, 0xa}, {0x3, 0x1, 0x4, 0x4}, {0x1, 0x3, 0x4, 0x4}, {0x4, 0x5, 0x3, 0xc}, {0x0, 0x2, 0xc, 0xc}], 0x10, 0x7}, 0x94) fsconfig$FSCONFIG_CMD_CREATE(r9, 0x6, 0x0, 0x0, 0x0) 1m51.851778879s ago: executing program 8 (id=28456): r0 = syz_genetlink_get_family_id$SEG6(&(0x7f0000003e40), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000004440)={0x0, 0x0, &(0x7f0000004400)={&(0x7f0000004380)={0x30, r0, 0x20d, 0x70bd2b, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x6}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x2}]}, 0x30}}, 0x4000) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8ab8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0xe, 0x0, &(0x7f0000000000)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x18) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r5, 0x800448d3, 0x0) r6 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004000000"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180200000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7}, &(0x7f0000000180), &(0x7f00000001c0)=r6}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r8}, 0x10) bind$bt_hci(r5, &(0x7f0000000100)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 1m50.958999157s ago: executing program 8 (id=28463): r0 = open(0x0, 0x0, 0x4) fcntl$notify(r0, 0x402, 0x8000003d) getpid() prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) setrlimit(0xd, &(0x7f0000000000)={0x5, 0x8}) bpf$PROG_LOAD(0x5, 0x0, 0x0) memfd_create(0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) unshare(0x64000600) 1m35.625917935s ago: executing program 37 (id=28463): r0 = open(0x0, 0x0, 0x4) fcntl$notify(r0, 0x402, 0x8000003d) getpid() prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) setrlimit(0xd, &(0x7f0000000000)={0x5, 0x8}) bpf$PROG_LOAD(0x5, 0x0, 0x0) memfd_create(0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) unshare(0x64000600) 13.749191737s ago: executing program 5 (id=29276): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000010a850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) (async) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r4 = fsopen(&(0x7f0000000080)='autofs\x00', 0x0) (async) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0x17, &(0x7f0000000080)=0x1, 0x4) r6 = socket$netlink(0x10, 0x3, 0x1) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[], 0x48}}, 0x0) fsconfig$FSCONFIG_SET_FD(r4, 0x5, &(0x7f00000005c0)='fd', 0x0, r3) (async) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) sendmsg$TCPDIAG_GETSOCK(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="a80000001200080029bd7000fbdbdf25010300084e234e22010000000a000000750000000700000006000000080200000004000168ebfffff58a9f75ad3ea5c419a2f650772c24c300", @ANYRES32=0x0, @ANYBLOB="09000000f9ffffff0c000000ba0c0000580001003160cf8228b3c21869bc1e293e2b782c69836972b1b37c998d508bbbb68e32bb054afadcd76ced199a654b84fb3eb69e2df6abc426d824caadc7441aeb057c485f95ea61816acf247da86bd365ecfc49004e6db504000100"], 0xa8}, 0x1, 0x0, 0x0, 0x80}, 0x40000) (async) r7 = fsmount(r4, 0x0, 0x2) r8 = openat(r7, &(0x7f00000002c0)='./bus\x00', 0x289c2, 0x1) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xf, &(0x7f0000000380)=ANY=[@ANYRESOCT=r8, @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000800008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r9}, 0x10) (async) syslog(0x9, 0x0, 0x0) (async) rseq(&(0x7f0000000300), 0x20, 0x0, 0x0) sigaltstack(0x0, 0x0) (async) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) r10 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f0000000100), 0xff, 0x4a1, &(0x7f00000004c0)="$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") (async) r11 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x143041, 0x8) pwritev2(r11, &(0x7f00000001c0)=[{&(0x7f0000000080)="ff", 0xfdef}], 0x1, 0xe7b, 0x0, 0x0) (async) fcntl$lock(r10, 0x7, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x2}) (async) r12 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, 0x0, r12) (async) ftruncate(0xffffffffffffffff, 0x2007ffc) 13.481112173s ago: executing program 5 (id=29279): ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000004c0)={'ip6_vti0\x00', &(0x7f0000000740)={'syztnl1\x00', 0x0, 0x29, 0x0, 0x17, 0x80000000, 0x4e, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1, 0x700, 0x7, 0x8, 0x4}}) r0 = socket$kcm(0x10, 0x4, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a0f0000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r1, 0x0, 0x200000000000006}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1/file3\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file3\x00', 0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) utimensat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00'}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = syz_io_uring_setup(0xbc3, &(0x7f0000000100)={0x0, 0x1568, 0x10000, 0x2, 0x285}, &(0x7f0000000040)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000300)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x2, 0xa3d8, &(0x7f00000005c0)=[{&(0x7f0000000240)="5db5bd", 0x3}], 0x10000000000002a8, 0x8, 0x1, {0x2}}) io_uring_enter(r3, 0x29ab, 0xd480, 0x0, 0x0, 0x0) 13.411790639s ago: executing program 5 (id=29282): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r2, &(0x7f0000000880)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="03", 0x1}], 0x1}], 0x1, 0x0) sendmmsg$inet_sctp(r2, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x1, 0xfffffffe}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{0xffffffffffffffff, 0xffffffffffffffff}, 0x0, &(0x7f0000000100)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r4, &(0x7f0000000340)="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", 0x0}, 0x20) bind$bt_sco(r3, &(0x7f0000000100), 0x8) listen(r3, 0x0) shutdown(r3, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'veth0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socket(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) openat(r7, &(0x7f0000000080)='./file1\x00', 0x2040, 0x21) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6(0xa, 0x800000000000002, 0x0) r8 = socket(0x10, 0x803, 0x0) r9 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r9, 0x29, 0x36, &(0x7f0000000300)=ANY=[@ANYBLOB="3c34000000000000040100c910fc02000000000000000000000000000107", @ANYRES32=r8], 0x1b0) setsockopt$inet6_IPV6_HOPOPTS(r9, 0x29, 0x36, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newqdisc={0x2c, 0x24, 0x4ee4e6a52ff56541, 0x70bd26, 0xffffffff, {0x0, 0x0, 0x0, r5, {0x0, 0xfff1}, {0xffff, 0x8}, {0x0, 0xf}}, [@qdisc_kind_options=@q_mq={0x7}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x24040884) sendmsg$nl_route_sched(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newqdisc={0x24, 0x28, 0x4ee4e6a52ff56541, 0x70bd28, 0xffffddfc, {0x0, 0x0, 0x0, r5, {0xa, 0x3}, {0xfff2}, {0x1, 0x1}}}, 0x24}, 0x1, 0x0, 0x0, 0x240440dc}, 0x0) 13.076880562s ago: executing program 5 (id=29286): socket$inet6(0xa, 0x3, 0x3c) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x800000, 0x0) r0 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000280)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x1, 0x0, 0x0, 0x0, 0x9]}}, 0x5c) setsockopt$MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x0, 0x0, @local}, {0xa, 0x4e22, 0x800, @empty}, 0x0, {[0x0, 0x8000]}}, 0x5c) setsockopt$MRT6_FLUSH(r0, 0x29, 0xd4, &(0x7f0000000340)=0x6, 0x4) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000300), &(0x7f0000000380), 0x2, 0x1) chroot(&(0x7f0000000100)='./file0\x00') r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00') r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYRES8=r2, @ANYRES32=r2, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000500)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) lsm_list_modules(&(0x7f0000000440)=[0x0, 0x0], &(0x7f0000000480)=0x10, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r3, 0x0, 0x800000000006}, 0x18) epoll_create(0x4) 13.076179762s ago: executing program 5 (id=29288): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) kexec_load(0xe7, 0x0, 0x0, 0x1) 12.824707716s ago: executing program 5 (id=29293): ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000004c0)={'ip6_vti0\x00', &(0x7f0000000740)={'syztnl1\x00', 0x0, 0x29, 0x0, 0x17, 0x80000000, 0x4e, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1, 0x700, 0x7, 0x8, 0x4}}) r0 = socket$kcm(0x10, 0x4, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a0f0000}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r2, 0x0, 0x200000000000006}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1/file3\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file3\x00', 0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) utimensat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00'}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = syz_io_uring_setup(0xbc3, &(0x7f0000000100)={0x0, 0x1568, 0x10000, 0x2, 0x285}, &(0x7f0000000040)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000300)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x2, 0xa3d8, &(0x7f00000005c0)=[{&(0x7f0000000240)="5db5bd", 0x3}], 0x10000000000002a8, 0x8, 0x1, {0x2}}) io_uring_enter(r4, 0x29ab, 0xd480, 0x0, 0x0, 0x0) 12.816437078s ago: executing program 38 (id=29293): ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000004c0)={'ip6_vti0\x00', &(0x7f0000000740)={'syztnl1\x00', 0x0, 0x29, 0x0, 0x17, 0x80000000, 0x4e, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1, 0x700, 0x7, 0x8, 0x4}}) r0 = socket$kcm(0x10, 0x4, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a0f0000}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r2, 0x0, 0x200000000000006}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1/file3\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file3\x00', 0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) utimensat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00'}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = syz_io_uring_setup(0xbc3, &(0x7f0000000100)={0x0, 0x1568, 0x10000, 0x2, 0x285}, &(0x7f0000000040)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000300)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x2, 0xa3d8, &(0x7f00000005c0)=[{&(0x7f0000000240)="5db5bd", 0x3}], 0x10000000000002a8, 0x8, 0x1, {0x2}}) io_uring_enter(r4, 0x29ab, 0xd480, 0x0, 0x0, 0x0) 11.910691076s ago: executing program 9 (id=29300): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0e000000040000000800000006", @ANYRES8, @ANYRES16], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="1c0000000000001811000000000000f8ff0000002fabbcd7c47cb74835c00033fd7615ab88cc02810d09057a13576b40df66058f15", @ANYRES8=r0, @ANYBLOB="0000000000000000b7080000000900007b8af8ff00000000bfa200000000000007f0fffff7ffffffb703000008000000b704400000f8ffffff00000000950000000be7e8b55cc545822e13275fa1e7dcea5b6f45420e9afe561f493db7e9b6cdbad3ad747ce97531964e75dfa9b2f62b731c59079b282e5a5379165e67e74cca0f444fe74179620a6d7e8aefd868e520cfe54c6c093426efb1841f76f67dd0567c7bd1a3433a900b4b46846d86591e6a0bc83f5b3c0c1ffa"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x72, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xd, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500ebff00002020207b1af8ff00000000bfa108000000000047010000f6ffffffb702000008000000b70300000000000085000000190000009500000000000000"], &(0x7f0000000340)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0xc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r1, 0x0, 0xffffffffffffffff}, 0x18) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000000)={'sit0\x00', &(0x7f0000000700)={'syztnl2\x00', 0x0, 0x7800, 0x7, 0x3, 0x2, {{0x26, 0x4, 0x1, 0x0, 0x98, 0x64, 0x0, 0x1, 0x2f, 0x0, @rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_prespec={0x44, 0x2c, 0xfc, 0x3, 0x0, [{@loopback, 0x3}, {@multicast1, 0x7dd}, {@multicast1, 0x8}, {@empty, 0x8}, {@multicast2, 0x9}]}, @end, @end, @generic={0x88, 0x9, "57291a5f522f20"}, @timestamp_prespec={0x44, 0x4c, 0x32, 0x3, 0x2, [{@broadcast, 0x8}, {@dev={0xac, 0x14, 0x14, 0x16}, 0xda8}, {@private=0xa010102, 0x2}, {@broadcast, 0x5}, {@rand_addr=0x64010101, 0xf}, {@private=0xa010103, 0x3}, {@empty, 0xffff7c77}, {@multicast2, 0xc}, {@private=0xa010101, 0x7f}]}]}}}}}) r2 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r2, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbfb, 0x20}, 0xc) r3 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r3, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfb, 0xfffffffe}, 0xc) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000000240)={[0x3ff]}, 0x8, 0x0) readv(r4, &(0x7f0000001200)=[{&(0x7f0000000480)=""/208, 0xd0}], 0x1) timer_create(0xfffffffffffffffc, 0x0, &(0x7f00000000c0)=0x0) timer_settime(r5, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) syz_read_part_table(0x408d, &(0x7f0000005700)="$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") r6 = syz_open_dev$sg(&(0x7f0000001600), 0x0, 0x40042) syz_io_uring_setup(0x88f, &(0x7f0000000140)={0x0, 0x3cfa, 0x0, 0x3, 0x8069}, 0x0, 0x0) ioctl$SG_GET_PACK_ID(r6, 0x227c, &(0x7f0000000040)) timer_gettime(r5, 0x0) rt_sigaction(0xe, &(0x7f00000001c0)={&(0x7f0000000100)="f30f1efc66450f2832c482adbcaf07000000c4e1e00300aa9c43713ef2400f1ed3c4c2e93be7da262ebef18f88a4a2e100430f12957b280000653ed9fa", 0x8000000, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffce) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0xb, 0x20000000ec071, 0xffffffffffffffff, 0xb381e000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0}, 0x18) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_SCAN(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r8, @ANYBLOB="0107000000000000000020000000040003"], 0x1c}, 0x1, 0x0, 0x0, 0x8041}, 0x0) 11.544389741s ago: executing program 9 (id=29301): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="02000000040000000800"], 0x50) r0 = syz_io_uring_setup(0xbc3, &(0x7f0000000100)={0x0, 0x1568, 0x10000, 0x2, 0x285}, &(0x7f0000000040)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x2, 0xa3d8, &(0x7f00000005c0)=[{&(0x7f0000000240)="5db5bd", 0x3}], 0x10000000000002a8, 0x8, 0x1, {0x2}}) io_uring_enter(r0, 0x29ab, 0xd480, 0x0, 0x0, 0x0) 11.543306921s ago: executing program 9 (id=29302): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xb}]}) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000700)=ANY=[@ANYBLOB="6c0800001000ffff26bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="973401002120000008000500", @ANYRES32=0x0, @ANYBLOB="4400128009000100766c616e00000000340002800600010001000000280004800c000100f7ffffff090000000600010006000000060000000c0001000600000000000000"], 0x6c}, 0x1, 0x0, 0x0, 0x1}, 0x8000002) socket$nl_route(0x10, 0x3, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x9, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10470a, 0x0, 0xfffffffb, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0xd, 0xc, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000160000009535529db2f4959a0527721f3c9e1adaf43f4c5b2c8a7584421f9a083e4ee31f40633b2d2ad243126d4d862995e7a403615247a93657bbaaacd0"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0xfffffffffffffe07, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000008c0)=@delchain={0x98, 0x65, 0x200, 0x70bd26, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x4, 0x2}, {0x4, 0xffff}, {0x1, 0xd}}, [@filter_kind_options=@f_bpf={{0x8}, {0x54, 0x2, [@TCA_BPF_FLAGS={0x8, 0x8, 0x1}, @TCA_BPF_OPS={{0x6, 0x4, 0x6}, {0x34, 0x5, [{0x3, 0x4, 0x6, 0x8000}, {0x7, 0x1, 0xce, 0xc}, {0x101, 0x0, 0x72, 0x64b}, {0x2, 0x0, 0x2, 0x9}, {0x4, 0x7, 0x7, 0xdf}, {0x940, 0x40, 0x3, 0x1}]}}, @TCA_BPF_NAME={0xc, 0x7, './file0\x00'}]}}, @filter_kind_options=@f_cgroup={{0xb}, {0x4}}, @TCA_RATE={0x6, 0x5, {0x3}}]}, 0x98}}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000095"], &(0x7f0000000440)='GPL\x00', 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) r7 = socket(0x10, 0x80003, 0x0) write(r7, &(0x7f0000000000)="240000001a005f0214f9f407000904000a000000fe0000000000000008000f00fd000000", 0x85) close_range(r7, 0xffffffffffffffff, 0x1000000000000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001240)={&(0x7f0000000200)='kfree\x00', r5, 0x0, 0xfffffffffffffffd}, 0x18) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) r11 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r8, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {0x0, r10, r11}}, 0x18) symlinkat(&(0x7f0000002040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') syz_io_uring_setup(0x109, &(0x7f0000000140)={0x0, 0xad7, 0x80, 0x1, 0x8089}, &(0x7f00000003c0)=0x0, &(0x7f0000000200)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r12, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) 10.906802444s ago: executing program 2 (id=29313): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[], 0x1c}, 0x1, 0x0, 0x0, 0x40810}, 0x0) close(r0) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) mremap(&(0x7f0000fef000/0x11000)=nil, 0x11000, 0x3000, 0x0, &(0x7f0000ff5000/0x3000)=nil) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x1}, 0x1c) listen(r2, 0x0) r3 = getpid() r4 = syz_pidfd_open(r3, 0x0) setns(r4, 0x8020000) mount_setattr(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x1900, &(0x7f0000000300)={0xf, 0x89, 0x40000, {r4}}, 0x20) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d0000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f0000000440)={{0x1, 0x1, 0x18, r6, {0x1}}, './file1\x00'}) ioctl$TCFLSH(r7, 0x540b, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f0000000180)={0x0, 0x3938700}, 0x0) syz_read_part_table(0x4097, &(0x7f00000040c0)="$eJzsz7FN61AYBeDjxE5elCdFUFAioKF1FsgWWQchWIIOiTLDsANDUNBg5FwcZ4EIhL6v8Dn2//tKN/yo17FWSZ727a0+fOhNxpqcl5gnZ0murvPYtsm/eZJ1Gd0fdpu0627VH/A/Sf0y6aer+nu6TLa7094OAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4TaqxPi9Lzkt8JJkeL3RHu4skd5uL2+H9oUmzuayGf/cms+H82bR/fnZFku3udDcCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP6gqi7ZLPLe582y/mJ/jm0YhIEwjF5iWwlLULMQS7B/Q3VIiIMJ6N7r/Ptz4bpqMT1dZuZvafd5zJ8xKv3X2uOatnoT/XvmVewZa773HQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOBgBw4EAAAAAID8XxuhqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqCjtwQAIAAAAg6P/rdgQKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwEMBAAD//33UI0E=") openat(0xffffffffffffff9c, &(0x7f00000013c0)='./file1\x00', 0x42, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000080000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d0000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r8}, 0x10) signalfd(r2, &(0x7f0000000280)={[0x1a3]}, 0x8) listxattr(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') close_range(r9, 0xffffffffffffffff, 0x0) connect$inet(r5, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) mount$bind(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)='./file1\x00', &(0x7f0000000400), 0x2041, 0x0) r10 = accept(r0, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[], 0xfffffdef}}, 0x1) recvfrom(r5, &(0x7f0000000180)=""/60, 0xfffffffffffffecb, 0x4100, 0x0, 0x0) 10.674082667s ago: executing program 9 (id=29316): socket$inet6(0xa, 0x3, 0x3c) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x800000, 0x0) r0 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000280)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x1, 0x0, 0x0, 0x0, 0x9]}}, 0x5c) setsockopt$MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x0, 0x0, @local}, {0xa, 0x4e22, 0x800, @empty}, 0x0, {[0x0, 0x8000]}}, 0x5c) setsockopt$MRT6_FLUSH(r0, 0x29, 0xd4, &(0x7f0000000340)=0x6, 0x4) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000300), &(0x7f0000000380), 0x2, 0x1) chroot(&(0x7f0000000100)='./file0\x00') r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00') r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYRES8=r2, @ANYRES32=r2, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000500)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) epoll_create(0x4) 10.628610671s ago: executing program 9 (id=29317): bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x3, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESHEX, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x30046, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYRESOCT=r0], 0x0, 0xfffff801, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x8, 0x3, &(0x7f0000000000)=0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000980)='tlb_flush\x00', r1}, 0x18) socket$inet6(0xa, 0x5, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) mknod$loop(0x0, 0x6000, 0x0) creat(0x0, 0x1c0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="50000000020605000000000000000000000000000c00078008000640000000000500010006000000050005000200000005000400000000000900020073797a31000000000c000300686173683a6970"], 0x50}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)={0x44, 0x9, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @rand_addr=0x64010102}}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @loopback}}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x10040047}, 0x240008c4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x44) sendmsg$NFT_MSG_GETSETELEM(0xffffffffffffffff, 0x0, 0x8000) r5 = socket$inet(0x2, 0x5, 0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) setsockopt$inet_mreqsrc(r5, 0x0, 0x27, 0x0, 0x0) 10.238425949s ago: executing program 9 (id=29320): syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000640)='./file0\x00', 0x3014850, &(0x7f0000000080)={[{@acl}, {@barrier_val={'barrier', 0x3d, 0x1000}}, {@grpjquota}, {@norecovery}, {@dioread_lock}]}, 0x3, 0x4d1, &(0x7f0000000680)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x7, 0x4, 0x8, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180200000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) epoll_create1(0x0) epoll_create1(0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)={0x28, r4, 0xacf5e67dd0b583a1, 0x0, 0x0, {{0x5}, {@val={0x8}, @val={0xc, 0x99, {0x0, 0xffffffff}}}}}, 0x28}}, 0x0) (fail_nth: 4) 10.238308629s ago: executing program 39 (id=29320): syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000640)='./file0\x00', 0x3014850, &(0x7f0000000080)={[{@acl}, {@barrier_val={'barrier', 0x3d, 0x1000}}, {@grpjquota}, {@norecovery}, {@dioread_lock}]}, 0x3, 0x4d1, &(0x7f0000000680)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x7, 0x4, 0x8, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180200000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) epoll_create1(0x0) epoll_create1(0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)={0x28, r4, 0xacf5e67dd0b583a1, 0x0, 0x0, {{0x5}, {@val={0x8}, @val={0xc, 0x99, {0x0, 0xffffffff}}}}}, 0x28}}, 0x0) (fail_nth: 4) 9.914705551s ago: executing program 2 (id=29324): syz_open_dev$tty1(0xc, 0x4, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x0, &(0x7f0000000200), 0x1, 0x4bc, &(0x7f0000000a40)="$eJzs3ctvW1UaAPDPdpMmaWb6mNGo7UjTSh2p81DjPDRqMjObWc3MotJoKrEBqYTEDSVOHMVOaaIuUth1wQKBQEIs2PMXsKErKiTEGvaIBSqCEiRAQjK613abOHGwII1p7u8n3ebch/2dU+s7Ovf4Xt8AMuts8k8uYjgiPoyIo43VrQecbfzZuH9zJllyUa9f/iKXHpestw5tve5IRKxHxEBE/P/fEc/ktsetrq7NT5fLpeXmerG2sFSsrq5duLYwPVeaKy2OTV6cmpocnRif2rO23n7puduX3vlv/9vfvHjv7svvvZtUa7i5b3M79lKj6X1xfNO2QxHxz0cRrAcKzfYM9roi/CTJ5/ebiDiX5v/RKKSfJpAF9Xq9/n39cKfd63XgwMqnY+BcfiQiGuV8fmSkMYb/bQzly5Vq7a9XKyuLs42x8rHoy1+9Vi6NNs8VjkVfLlkfS8sP18fb1ici0jHwK4XBdH1kplKe3d+uDmhzpC3/vy408h/ICKf8kF3yH7JL/kN2yX/ILvkP2SX/IbvkP2SX/Ifskv+QXfIfskv+Qyb979KlZKm37n+fvb66Ml+5fmG2VJ0fWViZGZmpLC+NzFUqc+k9Ows/9n7lSmVp7G+xcqNYK1Vrxerq2pWFyspi7Up6X/+VUt++tAroxvEzdz7ORcT63wfTJdHf3CdX4WCr13PR63uQgd4o9LoDAnrG1B9kl3N8oP0netvHBQOdXrj0cL4QeLzke10BoGfOn/L9H2SV+X/ILvP/kF3G+MAOj+jbYrf5f+DxZP4fsmu4w/O/frXp2V2jEfHriPio0He49awv4CDIf5Zrjv/PH/3jcPve/ty36VcE/RHx/BuXX7sxXastjyXbv3ywvfZ6c/v4phd2PGEAeqWVp608BgCya+P+zZnWsp9xP/9X4yKE7fEPNecmB9LvKIc2cluuVcjt0bUL67ci4uRO8XPN5503TmSGNgrb4p9o/s013iKt76H0uen7E//Upvh/2BT/9M/+X4FsuJP0P6M75V8+zel4kH9b+5/hPbp2onP/l3/Q/xU69H9nuozx7JsvfNox/q2I0zvGb8UbSGO1x0/qdr7L+PeeeuJ3nfbV32q8z07xW5JSsbawVKyurl1If0durrQ4NnlxampydGJ8qpjOURdbM9Xb/ePkB3d3a/9Qh/i7tT/Z9ucu2//d799/8uwu8f90bufP/8Qu8Qcj4i9dxv9q/JOnO+1L4s92aH9+l/jJtoku41df/c/hLg8FAPZBdXVtfrpcLi0rKCj0pHDrl1GNtkKveybgUauuJqfmSdL3uiYAAAAAAAAAAABAt/bjcuJetxEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4CD4IQAA//9HcdTQ") bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061134c0000000000bf2000000000000016001000071b48013d030100000000000f02000000000000bc26100000000000bf672000000000001602000000c0ffff6702000007000000360600000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a83683d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf5fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) socket$inet6_udp(0xa, 0x2, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x1a2) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x1000412, &(0x7f0000000100)={[{@grpid}, {@grpquota}]}, 0x4, 0x4eb, &(0x7f0000000540)="$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") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='blkio.bfq.io_queued_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0x8004587d, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x9cf, 0x1, 0x800000000001004}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) mkdirat(r2, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000300), r0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r4, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x40, r5, 0x4, 0x70bd26, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xe}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x40}, 0x800) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000004c0)={'syzkaller1\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000200)={r6, r8, 0x25, 0x4, @val=@uprobe_multi={0x0, 0x0, 0x0, 0x8}}, 0x40) r9 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r3, &(0x7f0000000080)={@val, @void, @eth={@broadcast, @remote, @val={@val={0x88a8, 0x6, 0x0, 0x3}, {0x8100, 0x0, 0x0, 0x4}}, {@llc={0x4, {@llc={0x2, 0xd4, "8f"}}}}}}, 0x1d) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0xa4c42, 0x108) 9.360557485s ago: executing program 2 (id=29325): r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000002c0), 0x88002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f0850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) pwritev(r0, &(0x7f0000000100)=[{0x0, 0x72}, {&(0x7f0000000140)="de", 0x1}], 0x2, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000a000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000400850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x5, 0x3100, 0x3100, &(0x7f0000000000), 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 9.263454414s ago: executing program 2 (id=29326): socket$inet6(0xa, 0x3, 0x3c) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x800000, 0x0) r0 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000280)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x1, 0x0, 0x0, 0x0, 0x9]}}, 0x5c) setsockopt$MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x0, 0x0, @local}, {0xa, 0x4e22, 0x800, @empty}, 0x0, {[0x0, 0x8000]}}, 0x5c) setsockopt$MRT6_FLUSH(r0, 0x29, 0xd4, &(0x7f0000000340)=0x6, 0x4) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000300), &(0x7f0000000380), 0x2, 0x1) chroot(&(0x7f0000000100)='./file0\x00') r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00') r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYRES8=r2, @ANYRES32=r2, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000500)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) epoll_create(0x4) 9.144592357s ago: executing program 2 (id=29328): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0xe, 0x7fff0000}]}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001cc0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) r2 = syz_io_uring_setup(0x3b51, &(0x7f00000006c0)={0x0, 0x7758, 0x1000, 0x8003, 0xdd}, &(0x7f0000000040)=0x0, &(0x7f0000000ac0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000002c0)=@IORING_OP_RENAMEAT={0x23, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1}) io_uring_enter(r2, 0x10007b0f, 0x96f0, 0x20, 0x0, 0x0) timerfd_create(0x7, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000510700140000000000000001b7080000000000007b8af8ff00000000b7080000fcffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5, 0x0, 0xfffffffffffffffc}, 0x18) r6 = socket(0x10, 0x2, 0x0) syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f00000001c0)='./file0\x00', 0x800002, &(0x7f0000000100)=ANY=[@ANYBLOB="756d61736b3d30303030303030303030303030303030303030333737372c616c6c6f775f7574696d653d30303030303030332c000000000083ec590d6e84de0249d09f31ef580c3d00000000", @ANYRESDEC, @ANYRESDEC=0x0, @ANYRES32=0x0, @ANYRESHEX, @ANYRES32], 0x1, 0x1b0, &(0x7f0000000700)="$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") openat$dir(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x101880, 0x104) r7 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r8 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffb}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000400)='virtio_transport_alloc_pkt\x00', r9}, 0x18) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000400)='virtio_transport_alloc_pkt\x00', r10}, 0x18) r11 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r11, &(0x7f0000000140)={0x28, 0x0, 0x0, @host}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000b, 0x12, r8, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x50) io_submit(0x0, 0x2, &(0x7f0000000380)=[&(0x7f0000000040)={0x1802, 0x0, 0x0, 0x5, 0x3, r8, 0x0}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x6, 0x2, r2, &(0x7f0000000580)="b98da98070cc96b07f73c1c98872e4f718af6dc79e8635b81000461b30893e89b59674c75c8ca12e6e46493a6f138c80efa59bd966893c450a11720eccdeba0222d09279b17f875da363059484a43c0563f6c99430b171ae688dd9b394499428907b7a70a5c41a285d312f3d4ba6a2110df2f803feeffccd22657c2b748190d4ccbfd360393a55f426902f31441944172b3ee46f0523778c82039834e16cffc9ef1470736616920bbff5a28dfbcd582e08b192fb9ec91ddc470631decfc1db1b8eb4a3e5e90e4c39020524340ae3", 0xce, 0x5, 0x0, 0x1, r8}]) write$selinux_load(r7, &(0x7f0000000000)=ANY=[], 0x2000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, 0x0) 8.795587521s ago: executing program 2 (id=29330): openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xc0241, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'sit0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, r2, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0xc}}, [@qdisc_kind_options=@q_hhf={{0x8}, {0x4}}, @TCA_RATE={0x6}]}, 0x38}, 0x1, 0x0, 0x0, 0x24048084}, 0x4006) socket$kcm(0x2, 0xa, 0x2) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffff00000001, 0x1ff}, 0x0, 0x3, 0x0, 0x0, 0x6, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x1) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000fff000/0x1000)=nil) socket$kcm(0x2, 0xa, 0x2) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r4}, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000005600)='sys_enter\x00', r5, 0x0, 0x2}, 0x18) unlink(0x0) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ptype\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1a, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYBLOB="f5cfda1a0eda45d5141966eb17a9423420a02a8b7c76688e816ad1329f7679f7cfa63e23a7b6f1fcc6a2195a8d17f0e4e8af18147c9e93c3e51be86bb21d260e6b2419bd249681b2cc5c50ba940b2441661db0b04ac55150d9ae3442454acf6374c41179170c552c176000b24ee5a9a6c6c17a7ee7278e6b4ffb4f50d2529f51e9c32351115d42f5c789d9d1ee7120c63a05d769c2e91c56a7f810825406a8abcb772904e212776fd36c013b9678c3ad848634bc2892cf67ee8891dd98af2abc15160a569ba4dd543aa2093fdcd5", @ANYRESDEC=r6], 0x0, 0x80000, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x6, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x5c}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x94) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), r9) sendmsg$DEVLINK_CMD_RATE_SET(r9, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000a40)=ANY=[@ANYBLOB="44000000ebe86ec38985f54af339b823232fb65be65bf6c5b26831f72cb9b184490aff17976c93dc288d2818c57fd04e4dc186042f93567faa5941b326bbba0f1afb15f7944cf5ad2a44ca37ec99ebff53cc0f2e66d4614d1d038a5c40d59b855bf8b2dbb5e28b664eec77dbab915eadf2e9ef71939445c7d4c64b0924a4370bcc879a9482949664f136a6f4aaf30242355555484dd73ee4616715f42b0ce3056c34", @ANYRES16=r10, @ANYBLOB="01082abd7000ffffff3e2a000000080058000000000008000300120000000e0001006e657464657673696d0000000f0002006e657464657673696d300000"], 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r11}, 0x10) r12 = socket$nl_route(0x10, 0x3, 0x0) r13 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r12, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001240)=@newqdisc={0x468, 0x24, 0x4ee4e6a52ff56541, 0x70bd25, 0x4, {0x0, 0x0, 0x0, r14, {}, {0xffff, 0xffff}, {0x6}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x43c, 0x2, [@TCA_TBF_PTAB={0x404, 0x3, [0x0, 0x4, 0xffffffff, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x25cf, 0x800000, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x400002, 0x0, 0x0, 0x0, 0x6, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x5, 0x0, 0x0, 0x7, 0x0, 0x0, 0x10000, 0x401, 0xfffffffe, 0x0, 0x0, 0xffffffff, 0x47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffff, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffd, 0x5, 0x0, 0x8001, 0x0, 0xfffffff7, 0x1ff, 0x81, 0x0, 0x0, 0x80000000, 0xfffffffa, 0x7, 0x9, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0xfffffffe, 0xfffffffd, 0x0, 0x1000, 0x0, 0x40000000, 0x0, 0x1, 0x0, 0x0, 0xfffe, 0x0, 0xd5a9, 0x0, 0x0, 0x0, 0x1000, 0xfb8d, 0x7b2, 0x4, 0x0, 0x0, 0x1, 0x0, 0x9, 0xfffffeff, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3, 0x8, 0x4, 0x0, 0x0, 0x100000, 0x1000, 0x40593e3a, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7, 0xd4, 0x8000c, 0x6, 0x0, 0x0, 0xffffffff, 0x400, 0x0, 0x1, 0x0, 0x6, 0x8, 0x3, 0x1, 0x0, 0xfffffffc, 0x1, 0x0, 0x8, 0x0, 0x1, 0x20000000, 0x4, 0x0, 0xe9, 0x3, 0xfffffffe, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x1, 0x2, 0x3ff, 0xfffffffc, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffff, 0x1, 0x0, 0x0, 0xfffffffc, 0x0, 0xff, 0x9, 0x0, 0x0, 0x40000000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x8, 0x0, 0x0, 0x2, 0x2, 0x1fd, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x7, 0x0, 0x0, 0x2e3, 0x0, 0x9]}, @TCA_TBF_RATE64={0xc, 0x4, 0xec73e2f8611702aa}, @TCA_TBF_PARMS={0x28, 0x1, {{0xff, 0x0, 0x0, 0x9, 0xfffc}, {0x2, 0x0, 0x5, 0x3, 0x0, 0x40}}}]}}]}, 0x468}}, 0x0) 8.753385184s ago: executing program 40 (id=29330): openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xc0241, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'sit0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, r2, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0xc}}, [@qdisc_kind_options=@q_hhf={{0x8}, {0x4}}, @TCA_RATE={0x6}]}, 0x38}, 0x1, 0x0, 0x0, 0x24048084}, 0x4006) socket$kcm(0x2, 0xa, 0x2) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffff00000001, 0x1ff}, 0x0, 0x3, 0x0, 0x0, 0x6, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x1) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000fff000/0x1000)=nil) socket$kcm(0x2, 0xa, 0x2) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r4}, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000005600)='sys_enter\x00', r5, 0x0, 0x2}, 0x18) unlink(0x0) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ptype\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1a, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYBLOB="f5cfda1a0eda45d5141966eb17a9423420a02a8b7c76688e816ad1329f7679f7cfa63e23a7b6f1fcc6a2195a8d17f0e4e8af18147c9e93c3e51be86bb21d260e6b2419bd249681b2cc5c50ba940b2441661db0b04ac55150d9ae3442454acf6374c41179170c552c176000b24ee5a9a6c6c17a7ee7278e6b4ffb4f50d2529f51e9c32351115d42f5c789d9d1ee7120c63a05d769c2e91c56a7f810825406a8abcb772904e212776fd36c013b9678c3ad848634bc2892cf67ee8891dd98af2abc15160a569ba4dd543aa2093fdcd5", @ANYRESDEC=r6], 0x0, 0x80000, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x6, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x5c}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x94) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), r9) sendmsg$DEVLINK_CMD_RATE_SET(r9, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000a40)=ANY=[@ANYBLOB="44000000ebe86ec38985f54af339b823232fb65be65bf6c5b26831f72cb9b184490aff17976c93dc288d2818c57fd04e4dc186042f93567faa5941b326bbba0f1afb15f7944cf5ad2a44ca37ec99ebff53cc0f2e66d4614d1d038a5c40d59b855bf8b2dbb5e28b664eec77dbab915eadf2e9ef71939445c7d4c64b0924a4370bcc879a9482949664f136a6f4aaf30242355555484dd73ee4616715f42b0ce3056c34", @ANYRES16=r10, @ANYBLOB="01082abd7000ffffff3e2a000000080058000000000008000300120000000e0001006e657464657673696d0000000f0002006e657464657673696d300000"], 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r11}, 0x10) r12 = socket$nl_route(0x10, 0x3, 0x0) r13 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r12, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001240)=@newqdisc={0x468, 0x24, 0x4ee4e6a52ff56541, 0x70bd25, 0x4, {0x0, 0x0, 0x0, r14, {}, {0xffff, 0xffff}, {0x6}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x43c, 0x2, [@TCA_TBF_PTAB={0x404, 0x3, [0x0, 0x4, 0xffffffff, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x25cf, 0x800000, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x400002, 0x0, 0x0, 0x0, 0x6, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x5, 0x0, 0x0, 0x7, 0x0, 0x0, 0x10000, 0x401, 0xfffffffe, 0x0, 0x0, 0xffffffff, 0x47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffff, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffd, 0x5, 0x0, 0x8001, 0x0, 0xfffffff7, 0x1ff, 0x81, 0x0, 0x0, 0x80000000, 0xfffffffa, 0x7, 0x9, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0xfffffffe, 0xfffffffd, 0x0, 0x1000, 0x0, 0x40000000, 0x0, 0x1, 0x0, 0x0, 0xfffe, 0x0, 0xd5a9, 0x0, 0x0, 0x0, 0x1000, 0xfb8d, 0x7b2, 0x4, 0x0, 0x0, 0x1, 0x0, 0x9, 0xfffffeff, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3, 0x8, 0x4, 0x0, 0x0, 0x100000, 0x1000, 0x40593e3a, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7, 0xd4, 0x8000c, 0x6, 0x0, 0x0, 0xffffffff, 0x400, 0x0, 0x1, 0x0, 0x6, 0x8, 0x3, 0x1, 0x0, 0xfffffffc, 0x1, 0x0, 0x8, 0x0, 0x1, 0x20000000, 0x4, 0x0, 0xe9, 0x3, 0xfffffffe, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x1, 0x2, 0x3ff, 0xfffffffc, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffff, 0x1, 0x0, 0x0, 0xfffffffc, 0x0, 0xff, 0x9, 0x0, 0x0, 0x40000000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x8, 0x0, 0x0, 0x2, 0x2, 0x1fd, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x7, 0x0, 0x0, 0x2e3, 0x0, 0x9]}, @TCA_TBF_RATE64={0xc, 0x4, 0xec73e2f8611702aa}, @TCA_TBF_PARMS={0x28, 0x1, {{0xff, 0x0, 0x0, 0x9, 0xfffc}, {0x2, 0x0, 0x5, 0x3, 0x0, 0x40}}}]}}]}, 0x468}}, 0x0) 8.710215209s ago: executing program 7 (id=29333): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket(0x10, 0x3, 0x4) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newqdisc={0x68, 0x14, 0xf0b, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, {0xd}, {0xb, 0x1}, {0xb, 0x4}}, [@TCA_STAB={0x44, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x0, 0xfc, 0x200, 0xa, 0x0, 0x0, 0x7e}}, {0x4}}, {{0x1c, 0x1, {0x0, 0x4, 0x7, 0xb, 0x1, 0x9, 0x2}}, {0x4}}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x20000000}, 0x18) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000280), 0x44000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000003740)=@newtaction={0xeb8, 0x30, 0xb, 0x0, 0x0, {}, [{0xea4, 0x1, [@m_gact={0x48, 0x1, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0x0, 0x0, 0x80006}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x3}}}}, @m_pedit={0xe58, 0x2, 0x0, 0x0, {{0xa}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{0x5, 0xa, 0x4, 0x1, 0x2000000}, 0x5, 0x1}, [{0x9, 0x80000001, 0x1, 0x630, 0x8, 0x1}, {0xdf, 0x4, 0x5, 0x5, 0x10, 0xe}, {0x1, 0x85a, 0x5, 0xe6db, 0x3, 0xfffffffc}, {0x6, 0x400, 0x9321, 0x9, 0x6, 0x7}, {0x5, 0x5, 0xffffffc0, 0x80, 0x3}, {0xe, 0xf5, 0x3, 0x9, 0xffffbff8, 0x3}, {0x0, 0x7, 0xfff, 0x2, 0x9163ef6c, 0x80003}, {0x3, 0x3, 0x80, 0x0, 0xacc4, 0x42}, {0x8001, 0xffb, 0x9, 0xffff, 0xfffffffe, 0x81}, {0x8, 0xfff, 0x6, 0xeb84, 0x8, 0x30c4}, {0x7, 0x9, 0xfffffffc, 0x100, 0x4}, {0x8004, 0x80000001, 0xfffffeff, 0xdf, 0x4, 0x5}, {0x7, 0x80000001, 0x9, 0x7, 0x1000, 0x7}, {0x5, 0x4, 0xfffffffd, 0x9, 0x474, 0x594}, {0x7fffffff, 0x1, 0x8, 0xfffffff9, 0x6, 0xffffffff}, {0x24, 0x5, 0xf, 0x6, 0x6, 0x8000003}, {0xbb, 0x5, 0x2, 0x310, 0xf}, {0x9b7d, 0x52fc, 0x3, 0x3, 0x48, 0x9}, {0xbd, 0x8, 0x10, 0xe4d, 0x7f, 0x3}, {0x8, 0x8, 0x9, 0x27, 0x2, 0x5}, {0x4, 0x401, 0x5, 0x6, 0x93e, 0x6}, {0x1, 0x7, 0x0, 0x0, 0xff, 0x3}, {0xb, 0x7f, 0xfffff419, 0x1, 0x3ff, 0x9}, {0x4, 0x8, 0x7, 0xb, 0x8, 0x80004d}, {0x34db, 0xffff, 0x0, 0x3ff, 0x1, 0x400}, {0xf, 0xcb1d, 0x8, 0x1, 0x0, 0x4}, {0x5, 0x3, 0x7, 0x8, 0x3, 0x984}, {0x2, 0xffffffff, 0x3, 0x2, 0x9, 0x40}, {0x7, 0x281, 0x7fffffff, 0x381, 0x3, 0x8}, {0x5, 0x4, 0x1, 0x8, 0x4, 0x2f}, {0x6, 0x3, 0x4, 0xd1a1, 0x9, 0x7}, {0x5, 0x3, 0x8, 0x4, 0x16, 0x2}, {0x8001, 0x87, 0x5, 0x1, 0x3, 0x4}, {0x6, 0x9e4, 0x8b7f, 0x11, 0x3, 0x7}, {0x7, 0x1, 0x800, 0x70f, 0x8001, 0x3}, {0x4, 0x10, 0x6, 0x1, 0x4, 0x22ff}, {0x5, 0x10001, 0x9, 0x0, 0x10001, 0x7}, {0xf85, 0x2e, 0x100, 0x3, 0x100, 0xe60c}, {0x2, 0x5, 0x1, 0xe000000}, {0x4e2, 0x6b0, 0x2, 0x100, 0x4, 0xd}, {0x1, 0xcad, 0xa5, 0x2, 0x4d800, 0x33}, {0x20, 0x7f, 0x33, 0x2, 0x400, 0x4}, {0x4, 0x62e, 0xb, 0x219c, 0x0, 0x5}, {0x0, 0x4, 0x0, 0x1, 0x1, 0x1}, {0x7f, 0x945a, 0x0, 0x0, 0x8, 0x3}, {0xda1, 0x893, 0x2, 0x9, 0xfffffa2e, 0x6}, {0x1, 0xfffffff3, 0x7fffffff, 0xa, 0x0, 0x1}, {0x2, 0x8, 0x2, 0xe, 0x2, 0x2}, {0x20000006, 0x100, 0xe, 0x10000, 0x5, 0x7}, {0x0, 0x6, 0x7, 0x4, 0xc, 0x800}, {0x8, 0x10000, 0x1, 0x1, 0x7}, {0x7d5, 0x2, 0x4, 0x800, 0xf}, {0x1, 0x5, 0x6, 0x2, 0x8, 0xc}, {0x2, 0x1, 0x3, 0xc, 0x3, 0x2c3}, {0x0, 0x3, 0xbc, 0x8001, 0xfa, 0x8}, {0x2, 0x3, 0x9, 0x50e, 0x55ac, 0xa5e2}, {0x0, 0x196680, 0xffffff91, 0x100, 0x3, 0x7}, {0x4, 0x4, 0x2, 0x1, 0x0, 0xe}, {0xfffffff5, 0x8, 0x7023, 0x8, 0x5, 0x851}, {0x3, 0x78, 0x7, 0xa, 0x5dec4cac, 0x6}, {0x8, 0x9, 0x39, 0x2, 0x8, 0x602}, {0x4, 0x7fffffff, 0x0, 0x8, 0x8, 0xff}, {0x7, 0xfffffff1, 0x2f2c, 0x400, 0x6, 0x6}, {0x10001, 0x81, 0xc000, 0x2, 0x89, 0x2}, {0x2, 0x8550, 0x4c, 0x3, 0xfffffffa, 0x736d}, {0x7f, 0x199, 0x5, 0x9, 0x7, 0x2}, {0x7, 0x1, 0x9, 0x7, 0x2, 0x7}, {0x9, 0x3f1, 0x4, 0x5, 0x5, 0x8}, {0x100, 0x3ff, 0x4, 0x7f53, 0x7, 0x1}, {0x3ff, 0xc, 0x4, 0x1, 0x4, 0x4}, {0x9, 0x381, 0xffd, 0x5d7c, 0x0, 0x8001}, {0x8, 0x0, 0x7, 0xfffffffb, 0x3ee, 0x4}, {0xbfffffe, 0x6, 0x101, 0x5, 0x400, 0x400}, {0x7fff, 0xb3, 0x2, 0x10000, 0x6, 0x14}, {0x0, 0x1, 0x4c90, 0x4, 0x7f, 0x8}, {0x5, 0x25b, 0xe9, 0x3, 0x2, 0x2}, {0x29dbdf0, 0xd, 0xfffffffd, 0x7, 0x6, 0x3}, {0x7, 0x1, 0xa, 0x8, 0x5, 0x5}, {0x473, 0x8, 0x2, 0x400, 0x4000000, 0x69b3d6e6}, {0x1, 0xb7bb, 0x22800000, 0x3, 0x10, 0x9}, {0x7f, 0x4, 0x6, 0xffffffff, 0x3, 0x8}, {0xfffffff7, 0x80000000, 0xa, 0x40, 0x863, 0x2}, {0xb, 0x9, 0xc, 0x3c1, 0x6e, 0x40}, {0xe57, 0xd, 0x8, 0xfb0000, 0x1, 0x7}, {0xe0, 0x100, 0x1, 0x7, 0x8, 0x7}, {0xfff, 0x1, 0x0, 0x38, 0x0, 0x9}, {0x82, 0x10, 0x401, 0x0, 0x4, 0xef}, {0x7, 0x2, 0x200, 0x8, 0x9, 0x2}, {0x54, 0x5, 0xa33f, 0x101, 0x2, 0x10001}, {0x1, 0x4, 0x800004, 0x10001, 0x2, 0xce}, {0x4, 0x8, 0x8, 0x3, 0xf, 0x9}, {0x6, 0x5, 0x8, 0xffffffff, 0x405b9, 0x6}, {0x9, 0x0, 0x9, 0x2, 0x9}, {0x0, 0x2, 0xb, 0x7fffffff, 0xfc0, 0x7f1b4893}, {0x4, 0xd, 0xc, 0x4, 0x7, 0x4}, {0x4, 0x5, 0xe, 0x3, 0x3dcb, 0x9}, {0x200, 0x0, 0xe8, 0x1, 0x800000d4, 0x1}, {0xc651, 0x5f83, 0x2, 0x1, 0xd, 0x8}, {0xfff, 0x5, 0x1, 0x0, 0x49, 0x5}, {0x6, 0x3, 0x7, 0x97fd, 0xef, 0x202}, {0x2, 0xa, 0x1000, 0x1, 0x6, 0xe0}, {0x800, 0x4c, 0x7, 0x0, 0xfffffff7, 0x9}, {0x6, 0xffff, 0xffdf8001, 0xa, 0xae36, 0x8}, {0xcfb7, 0x0, 0x101, 0x2, 0x1, 0x1aca}, {0x6, 0x800, 0xec3d, 0xffffffff, 0xea5, 0x3}, {0x9, 0x5, 0x2, 0x0, 0x0, 0xde}, {0x6, 0x6, 0x0, 0x1e9, 0x6, 0x1}, {0x3, 0x7, 0x7, 0x3, 0x400, 0x81}, {0x970, 0x100, 0xb2eb, 0x2, 0x3, 0x9}, {0x3, 0x6, 0x8, 0x7, 0xd, 0x474c}, {0xf, 0x101, 0x9a, 0x1000, 0x2, 0xfffffffc}, {0x3, 0x98e, 0x1a5e666b, 0x10, 0x7, 0x9}, {0xfffffffb, 0x3, 0x3, 0x2ee8000, 0x8}, {0x3, 0x2, 0x2, 0x3, 0x3, 0x2}, {0x7, 0x4, 0x1, 0x7, 0x101, 0xef}, {0x709e, 0x9, 0x425b597f, 0x1, 0x2, 0x7}, {0x6, 0xc000000, 0x3ff, 0x4, 0x8, 0x5}, {0x3, 0x6, 0x7, 0xfffffff9, 0x0, 0xffffffff}, {0x7, 0x9, 0x8, 0x0, 0x9, 0xd6}, {0x24, 0x10001, 0x6, 0x1, 0x39d6}, {0x401, 0x7d4, 0x9, 0x8000, 0xffff, 0x7}, {0x6, 0x92e4, 0x130, 0x0, 0x4, 0x9}, {0x1, 0x7fff, 0x7, 0x8001, 0x8, 0x5}, {0x7e, 0x808, 0xfffffff9, 0xa, 0x4b64, 0x80000001}, {0x2ad78a25, 0x2, 0x6, 0x6, 0x4, 0x8}, {0x2, 0x9, 0x0, 0x8a7, 0x129, 0xc}, {0x7, 0x2, 0x8, 0x3, 0xe01, 0xf933271}, {0x4a3, 0x0, 0x3, 0x514c, 0xf8b, 0x19}], [{0x5}, {0x4, 0x1}, {}, {0x1}, {0x3}, {0x0, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {}, {0x5}, {0x1}, {0x2}, {0x0, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x4}, {}, {0x1, 0x1}, {0x5, 0x1}, {0x5}, {0x3}, {0x5, 0x1}, {}, {0x0, 0x1}, {0x3}, {0x2, 0x1}, {0x4}, {0x4}, {0x5, 0x1}, {0x3, 0x1}, {}, {0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x4}, {0x1}, {0x1, 0x1}, {0x4}, {0x5}, {0x3, 0x1}, {0x1}, {0x3}, {0x2, 0x1}, {0x5, 0x1}, {0x3}, {0x3}, {0x0, 0x1}, {0x3, 0x1}, {0x4}, {0x4, 0x1}, {0x2}, {0x3}, {0x5, 0x1}, {0x1}, {0x1}, {0x3}, {0x5, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x4}, {0x5}, {0x1, 0x1}, {}, {0x3}, {0x0, 0x1}, {0x5}, {0x4}, {0x4, 0x1}, {0x0, 0x1}, {0x2}, {0x5}, {0x9, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {}, {0x3, 0x1}, {}, {0x1, 0x1}, {0x1}, {0x2}, {0x2, 0x1}, {0x6, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x3}, {0x3, 0x1}, {0x1}, {0x2}, {0x2}, {0x5}, {0x3, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x2}, {0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x5}, {0x4}, {0x2, 0x1}, {0x3, 0x1}, {0x4}, {0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x3}, {0x3, 0x1}, {0x0, 0x1}, {0x5}, {0x3, 0x1}, {0x4}, {0x5}, {0x3}, {0x5, 0x1}, {0x3}, {0x4}, {0x5, 0x1}, {0x3, 0x1}, {0x4}, {0x1, 0x1}, {0x4, 0x1}, {0x6, 0x1}, {0x5, 0x1}]}}, @TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xeb8}}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000004000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7}, &(0x7f0000000180), &(0x7f00000001c0)=r6}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x3f, 0x0, 0x0, 0x0, 0xb}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) r9 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r9, &(0x7f0000000880)=[{&(0x7f0000000440)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000040)="03", 0x1}], 0x1}], 0x1, 0x0) sendmmsg$inet_sctp(r9, &(0x7f00000032c0)=[{&(0x7f00000000c0)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000300)='5', 0x1}], 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="30000000000000008400000001000000000000000c"], 0x30}], 0x1, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000780)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x343}}}}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x48800}, 0x0) 8.500248269s ago: executing program 7 (id=29334): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x48a475035414f534) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback, 0x8000000, 0x0, 0xff, 0x1}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x11, 0xf, &(0x7f0000000c40)=ANY=[@ANYBLOB], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_open_procfs(0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0xf2a44430ae55fca4, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f00000000c0)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x7, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000080), 0x4) close(r3) r4 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r4, 0x8982, &(0x7f0000000080)={0x0, 'geneve0\x00', {}, 0xb}) r5 = socket$rds(0x15, 0x5, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000140)='kfree\x00', r6, 0x0, 0xa}, 0x18) bind$rds(r5, &(0x7f0000000040)={0x2, 0x4e22, @loopback}, 0x10) sendmsg$rds(r5, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000640)=[@mask_fadd={0x58, 0x114, 0x8, {{0xc30a, 0x6}, &(0x7f0000000180)=0x8000000000000001, 0x0, 0xffff, 0x3, 0x6, 0x9, 0x18, 0x100000001}}], 0x58}, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000640)) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x1000410, &(0x7f0000000440)={[{@grpid}, {@grpquota}]}, 0x4, 0x4eb, &(0x7f0000000540)="$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") r7 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x300) ftruncate(r7, 0x2007ffc) r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x441, 0x2) fallocate(r8, 0x8, 0x4000, 0x4000) 8.343879655s ago: executing program 7 (id=29335): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x109942, 0x0) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f0000000580)) ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) 8.220298437s ago: executing program 7 (id=29336): socket$inet6(0xa, 0x3, 0x3c) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x800000, 0x0) r0 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000280)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x1, 0x0, 0x0, 0x0, 0x9]}}, 0x5c) setsockopt$MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x0, 0x0, @local}, {0xa, 0x4e22, 0x800, @empty}, 0x0, {[0x0, 0x8000]}}, 0x5c) setsockopt$MRT6_FLUSH(r0, 0x29, 0xd4, &(0x7f0000000340)=0x6, 0x4) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000300), &(0x7f0000000380), 0x2, 0x1) chroot(&(0x7f0000000100)='./file0\x00') r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00') r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYRES8=r2, @ANYRES32=r2, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000500)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) epoll_create(0x4) 8.042779974s ago: executing program 7 (id=29338): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1342, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000540)="89e7ee0c7cdad9b4b47380c988cafbe863ca", 0x12}, {&(0x7f0000000000)="448b7cff030000000000008a15df", 0xe}, {&(0x7f0000000100)="36d1ce1e6d25a8", 0x7}], 0x3) 7.946931183s ago: executing program 7 (id=29339): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x2000) 7.946699033s ago: executing program 41 (id=29339): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x2000) 4.452477885s ago: executing program 4 (id=29361): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x50) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='pids.current\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2c, r3, 0x1, 0x70bd29, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0x7f}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x1}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}]}, 0x2c}}, 0xc0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r6}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="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"/287], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) getpeername$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000280)={'syztnl0\x00', 0x0, 0x40, 0x7, 0x7fffffff, 0xb5a, {{0x25, 0x4, 0x0, 0x4, 0x94, 0x66, 0x0, 0x8, 0x5e16bea9da2c0386, 0x0, @multicast1, @broadcast, {[@noop, @cipso={0x86, 0x51, 0x0, [{0x0, 0xb, "b120408bbdb3f01fa5"}, {0x7, 0x10, "819ba3f81d5541f9680628660198"}, {0x6, 0x4, "3cb7"}, {0x0, 0x4, 'x)'}, {0x6, 0x6, "ec16c25d"}, {0x7, 0xb, "f29b7ba923c63f514e"}, {0x5, 0x5, "44db25"}, {0x2, 0x12, "da9a5b4a942314c2d3fa09f1dfa4358f"}]}, @rr={0x7, 0xb, 0x49, [@private=0xa010102, @remote]}, @rr={0x7, 0xb, 0x6c, [@multicast2, @empty]}, @lsrr={0x83, 0x7, 0x63, [@local]}, @cipso={0x86, 0xf, 0x2, [{0x2, 0x9, "05503082c85da8"}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'syztnl0\x00', &(0x7f0000000340)={'syztnl0\x00', 0x0, 0x20, 0x8, 0x81, 0x3, {{0x15, 0x4, 0x3, 0x1, 0x54, 0x66, 0x0, 0x7c, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x20, 0x43, 0x0, 0x7, [0x0, 0x2, 0x2, 0x401, 0xfffffffc, 0xffff, 0x4]}, @cipso={0x86, 0x1e, 0x2, [{0x4, 0xd, "78defd5117e9096bd63a82"}, {0x7, 0xb, "80a0b2fe293160afda"}]}]}}}}}) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000500)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x90, r3, 0x300, 0x70bd27, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_ADDR_REMOTE={0x1c, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x81}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}]}, @MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x3}, @MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x1}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x15}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r7}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r8}]}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r9}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r10}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x90}, 0x1, 0x0, 0x0, 0x2400c000}, 0x4810) 4.287006681s ago: executing program 4 (id=29362): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000001c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1, 0x0, 0xff}, 0x18) kexec_load(0xe7, 0x0, 0x0, 0x1) 4.240407565s ago: executing program 4 (id=29364): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r1, 0x0, 0xff}, 0x18) kexec_load(0xe7, 0x0, 0x0, 0x1) 4.158539243s ago: executing program 4 (id=29365): socket$inet6(0xa, 0x3, 0x3c) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x800000, 0x0) r0 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000280)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x1, 0x0, 0x0, 0x0, 0x9]}}, 0x5c) setsockopt$MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x0, 0x0, @local}, {0xa, 0x4e22, 0x800, @empty}, 0x0, {[0x0, 0x8000]}}, 0x5c) setsockopt$MRT6_FLUSH(r0, 0x29, 0xd4, &(0x7f0000000340)=0x6, 0x4) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000300), &(0x7f0000000380), 0x2, 0x1) chroot(&(0x7f0000000100)='./file0\x00') r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00') r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYRES8=r2, @ANYRES32=r2, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000500)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) epoll_create(0x4) 4.050690424s ago: executing program 4 (id=29366): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c5"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r0}, 0x18) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000aa40)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000ebff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = io_uring_setup(0xf07, &(0x7f0000000580)={0x0, 0x400826e, 0x1, 0x3, 0xf0}) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f0000000400)=[{0x0}, {0x0}], 0x2) syz_clone3(&(0x7f0000000000)={0x285002400, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x46) io_uring_register$IORING_REGISTER_FILES(r2, 0x1e, &(0x7f0000000000)=[r2], 0x1) (fail_nth: 1) 3.614326417s ago: executing program 4 (id=29373): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000001c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1, 0x0, 0xff}, 0x18) kexec_load(0xe7, 0x0, 0x0, 0x1) 3.614098037s ago: executing program 42 (id=29373): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000001c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1, 0x0, 0xff}, 0x18) kexec_load(0xe7, 0x0, 0x0, 0x1) 3.554242263s ago: executing program 0 (id=29376): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b70400000000000085000000430000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) migrate_pages(0x0, 0xfc, &(0x7f0000000200)=0x7ffffffffffffffd, &(0x7f0000000240)=0x1) writev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)='4', 0x1}], 0x1) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000001540)=@newtaction={0x18, 0x30, 0x829, 0x0, 0x0, {}, [{0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0xc010}, 0x4044040) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000580)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x1, 0x6e9}, 0x1184c, 0x9, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x5, 0xffffffffffffffff, 0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x20, 0x20, &(0x7f0000000280)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffb}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x4}, @jmp={0x5, 0x1, 0x4, 0x0, 0x6, 0x6}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffa}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4}, @ldst={0x3, 0x3, 0x3, 0x7, 0xa, 0x4, 0xfffffffffffffff0}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x29}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], &(0x7f0000000180)='GPL\x00', 0x10001, 0x0, 0x0, 0x40f00, 0x6, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0xd, 0x4, 0x2}, 0x10, 0x0, r2, 0x3, &(0x7f0000000380)=[r0, r0, r0, r0], &(0x7f00000003c0)=[{0x5, 0x2, 0x9}, {0x2, 0x5, 0xb, 0x7}, {0x0, 0x4, 0x10, 0x3}], 0x10, 0x5}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000940)={r3, 0x0, 0x53, 0xfa, &(0x7f0000000500)="b8d14a0a17f71ae3595ae58b52226300c6d2e50b8128c789e9c3dc4b7ec227e4e0f294636e7ecb4902455ca3e2dba01b0436129c7cad72968b09a705e550146acd2c31ed5beb968443f150f4cab130159fbd77", &(0x7f00000007c0)=""/250, 0x7, 0x0, 0x2a, 0x70, &(0x7f0000000400)="cfc5960461e557784b7c99a6ff7548974a8ab62a80403044f029295f54df740e9acccbd7998547d3fb8e", &(0x7f00000008c0)="97e54680a5bf1bfe4010ad70b8a51aa31acb56775a67ea8b4b5dd99cbdd5e8c5db87fafc24294834bbe5b5e5f3d4ec1db99dd9dd038c0c9f8d57dbd1adb5a8616feef2fd7d5692ab1549efe6886b8d96a57673cfe4c91b784faeac1a75830bef05a354a5aacd3135182d8d924c467b01", 0x1, 0x0, 0x3}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000300), 0x0}, 0x20) 3.222353355s ago: executing program 1 (id=29380): r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_buf(r1, 0x29, 0xd3, 0x0, &(0x7f0000001480)) pwrite64(r0, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) rename(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='./file2\x00') pwritev2(r0, &(0x7f00000009c0)=[{&(0x7f0000000500)="e703ddf4b269294b273280199e98f6073a7271a3a2ff2d287634cd46417643ea0dd25f59f8e8b1cf0b6c72675bcf82dc6a26e1713ec8d78c2a3e8617dc7d85407e2a60b12dc1b33a4d5efa327f209d9ac5c316a093c8cd5639d1c0c33de77da5fcda7b78a93c381480c54cee55e2524e15eab7ed1ef42f06b299e6ed82b7ba7cf680d2ae5629fccbcc5cbba6129b7ecec9d26378240a6ea25b39be3490169296bf9b6245564ac53f36b66b4c6cd3219f5464afb979a6487b02962669df307138025c02bf5d25bd22478be74f95688bb83be86b1637948678bf46479332f55617d3be7fe19654dcb0c673b9779811a2d30d5e", 0xf2}, {&(0x7f0000000600)="519f8ce29be07946e952dfc157396bc814d5b73b926ab59935a3a943e8684d24323b2b23759edaa2f6783b05665da8caefa6567d545254bf0807e8e8e01ada5eba819f6b3a3e7d7f344378db1ffb17e8e549df44116efe392426084f6aefe2c2a0bf4415962c42268d3ea2e4cfa51aff2d48a1856b9b045c2f5123c9e7", 0x7d}, {&(0x7f00000007c0)="bddc47647bcced768ce2197215d291a4c22b7473c74d85cb40f94076ded55ce144802dd0cf71e738ad9ec3972c3ca8779b670aa19f9d6a0e59bdf918f85b0f0571d607ed0805475d59992dc1b84b462a635fc99980d838245e97a86fbea6e3d5fa33f875a5bb328a970908da4384b24cb5ffad0a9e8de630ce60bb53dc98929eaf9b61c00007dfe67da2ab28fdc83b4e3242a74611ec3fd15cd9801d2a699c6b6bd593a6a07aae9feca17f846fedc425b0dd95f0d0e418931397ec1053423abc500b874365f009ceab9c04e5b56baf9ad54feae9589aae77c3ad603fb79f969534dcc131352627dc2f170e0b2c5fa24bebece67795b0cbda1c95781455", 0xfd}, {&(0x7f0000000440)="2c56bed553b2dc7aa01a5ef52841f757ae8de7b4d6e227bdf9", 0x19}, {&(0x7f00000008c0)="5386105a7b4f55b3fadf2a035181776bd68f031e957fce8bca01f007d6476486adcdd07045f1a0dc6263da528bfeb9d39470044b3d8657cd39f75a29afa7af", 0x3f}, {&(0x7f0000000900)="6a3a5a6a12637f6d5af0dedb8d28416dfc0cd1c60055304ccece0966d3da3dbba8bcba575be7c9d31dfdc3651f56b621efdd63efd1172b4c73b2071df70fd8b641e196ad453e6d7acc704394dbdd20e9c6c2288d1c1f8eef10172aa4dc67f0862558ab299ddc3763170dea2a6aaa9034d88e9801d2fafddd881a707eaa635474e90139613286c9d2e098c9a26eb7792267aa6aeb18549ceac05c7fd95af6747a83d58616105c", 0xa6}], 0x6, 0x1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f0000000140)=[{&(0x7f00000001c0)="580000001400192340834b80040d8c560a067f0202ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100050c10000000010000000000", 0x58}], 0x1) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000005, 0x40010, r0, 0x0) syz_io_uring_setup(0xa4d, &(0x7f0000000480)={0x0, 0x0, 0x80, 0x1, 0x24f}, &(0x7f00000000c0)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f0000000200)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x42, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, {0x2}}) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), r0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r7, 0x4, 0x70bd26, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4061}, 0x4044015) mq_open(&(0x7f00000003c0)='&\x00', 0x80, 0x20, &(0x7f0000000400)={0x800, 0x800, 0x400}) syz_io_uring_submit(r3, r5, &(0x7f00000001c0)=@IORING_OP_FADVISE={0x18, 0x11, 0x0, @fd=r0, 0xe63, 0x0, 0x5, 0x4, 0x0, {0x0, r6}}) symlink(&(0x7f0000001640)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/../file0\x00', &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') link(&(0x7f0000000680)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/../file0\x00', 0x0) 2.914115295s ago: executing program 0 (id=29383): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000040)="2e00000011008188040f80ec59acbc0413a1f8480b0000005e140602000000000e0027001000000002800000121f", 0x2e}], 0x1}, 0x0) 2.898911317s ago: executing program 3 (id=29384): r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000800), 0xffffffffffffffff) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'veth1_to_hsr\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000004c00)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x74, r2}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xb, &(0x7f0000000280)=ANY=[@ANYRES64=r1], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x11, '\x00', r2, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r3}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000100)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0xfffffff7, 0x0, 0x0, 0x0, @in6={0xa, 0x4e24, 0x7, @dev={0xfe, 0x80, '\x00', 0x28}, 0x2}, @in6={0xa, 0x4e20, 0x1d, @empty, 0x9}}}, 0x118) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) read(r4, &(0x7f0000032440)=""/102364, 0x18fdc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000700)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) r6 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/kernel/notes', 0x0, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendfile(r7, r6, 0x0, 0x7ffff088) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000005c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r0}}, './file0\x00'}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{}, &(0x7f0000000600), &(0x7f0000000640)=r3}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x10, 0x12, &(0x7f0000000840)=ANY=[@ANYBLOB="180000040600000000c75ae0000000870b0000950000008eb9008ac85636f1f300010000850000006e00000008126c804933d013e5e255c860b7935ec4b69f67e6eed55a79babb878cf5a6e56af5d36025e56246531842b9f87528dc7ef38c3bef26c74d770b6b08472ff0d4f533e8952b950895b34489862e56ff58ab09f61d9f4d4dd64e0353a4d1d369e992dfcb1d73ab6dcd6fdfbd77ca81e7a18019402506660774dd1002ef60dd096990471cb0063fbae27a1af1ef20cd8b97460f2a1322c80e", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000200000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xc, 0xe9e, 0x8000}, 0x10, 0x0, r5, 0x0, &(0x7f00000006c0)=[r0, 0xffffffffffffffff], 0x0, 0x10, 0x8}, 0x94) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000300)={'ip6gretap0\x00', 0x0}) r10 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x1, 0xa}, 0x1184c, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r11 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r11, 0x1, r10, &(0x7f0000000040)={0xa0000004}) epoll_wait(r11, &(0x7f0000004140)=[{}], 0x1, 0x200000) sendmsg$nl_route_sched(r8, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newtfilter={0x24, 0x11, 0x1, 0x70bd28, 0x2000, {0x0, 0x0, 0x74, r9, {0xfffd, 0x10}, {0x1, 0xfff1}, {0x6, 0x3}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x14004804}, 0x8804) 2.686898707s ago: executing program 1 (id=29386): socket$packet(0x11, 0xa, 0x300) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f00000002c0)='syzkaller\x00', 0x3}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x560b0000, &(0x7f0000000000)="259a53f271a76d2688ca4c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) (fail_nth: 4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$packet(0x11, 0x2, 0x300) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0x6}, 0x18) 2.380679307s ago: executing program 1 (id=29387): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000040)="2e00000011008188040f80ec59acbc0413a1f8480b0000005e140602000000000e0027001000000002800000121f", 0x2e}], 0x1}, 0x0) 2.231826042s ago: executing program 0 (id=29388): ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000004c0)={'ip6_vti0\x00', &(0x7f0000000740)={'syztnl1\x00', 0x0, 0x29, 0x0, 0x17, 0x80000000, 0x4e, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1, 0x700, 0x7, 0x8, 0x4}}) r0 = socket$kcm(0x10, 0x4, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a0f0000}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1/file3\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file3\x00', 0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) utimensat(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00"], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r4}, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r5}, 0x10) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001b40)={&(0x7f0000000d40)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="a1ab2abd7000000000003200000008001701"], 0x24}, 0x1, 0x0, 0x0, 0x4050}, 0x0) r6 = syz_io_uring_setup(0xbc3, &(0x7f0000000100)={0x0, 0x1568, 0x10000, 0x2, 0x285}, &(0x7f0000000040)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000300)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x2, 0xa3d8, &(0x7f00000005c0)=[{&(0x7f0000000240)="5db5bd", 0x3}], 0x10000000000002a8, 0x8, 0x1, {0x2}}) io_uring_enter(r6, 0x29ab, 0xd480, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, 0x0, 0x80) 2.158886169s ago: executing program 0 (id=29389): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff47}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r3}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x50) r4 = socket(0x10, 0x803, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000002240)='./file0\x00', 0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="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", @ANYRES16], 0x1, 0x2c2, &(0x7f00000006c0)="$eJzs3T+LI2UYAPBndpNJ7iySwkoEB7SwOm6vtckiOThMpaRQC128O5AkCHew4CkGK1sbSz+BINj5JWwEP4DgB7DzioNXJpkh2btJsoHLrX9+vyL77Lzv877POzPZPyzz7sevziZ3i7j/9Ze/R7ebxdEgBvE4i34cRS2llGJl8G0AAP9mj1OKP9PSJVMG5UsWEd3DlgYAHMje3/9/OnhJAMCBvff+B++cjkbDd4uiG7dn35yPy9/sy4/L9tP78WlM417cjF48Wf4toP5poXy9nVKat4pSP96Yzc/HZebso1+q8U/riU6iF/1FdDH/zmh4Uiyt5c/LOq5X8w/K+W9FL15umP/OaHirIT/Gebz5+lr9N6IXv34Sn8U07i6KWOV/dVIUb6fv/vriw7K8Mj+bn487i34r6fjFXRUAAAAAAAAAAAAAAAAAAAAAAP7rblR753RisX9Peajaf+f4SflJO4pa/+L+PMv8rB7oqf2B5im+T6nTihgNbxZFkaqOq/xWvNKK1tWsGgAAAAAAAAAAAAAAAAAAAP5ZHn7+aHI2nd570BD8dj1iQ9OGoN4NoH6sf0fW8aamwdqR1+LR5KyzecC1pqMq3DJpHNd9soity4lWux65v9dJ2D+4tqnmH37cd8Du7j7tbefn+QT13TU5y6KxTyfqI936mv683iePS86Vb2pKu2+/tSBvbOrtvfb8pUUw39Insm2FvfXH8sxVR7KnV5EvzmpjenttN47me6P5Wmx6pzwjW7yt8+f3xQcAAAAAAAAAAAAAAAAAALhg9dDvM03XdqQepc7BygIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAF2r1///3COZV8iU65/Hg4RUvEQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgP+BvwMAAP//QSRWPA==") r5 = openat(0xffffffffffffff9c, &(0x7f0000004280)='.\x00', 0x0, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r5, 0x82307201, 0x0) sendmsg$IPVS_CMD_SET_INFO(r4, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) r6 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xc, 0xa8}, 0x100002, 0x4, 0xfffffffc, 0x0, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7}, &(0x7f0000000180), &(0x7f00000001c0)=r6}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r8, 0x0, 0x6}, 0x18) r9 = socket$inet6_sctp(0xa, 0x801, 0x84) sendto$inet6(r9, &(0x7f00000005c0)="aa", 0xfdc1, 0x4008881, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @private2, 0x3}, 0x1c) shutdown(r9, 0x1) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r11 = socket$nl_route(0x10, 0x3, 0x0) r12 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r12, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e24, 0xc, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x2}, {0xa, 0x4e22, 0x6fe3, @mcast2, 0x8393}, 0x0, {[0x80000000, 0x6, 0x7, 0x9, 0xbd, 0x7ff, 0xbb23, 0x400]}}, 0x72) sendmsg$nl_route(r11, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0xff05, 0x0, 0x0, {0x0, 0x0, 0x4a00}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x3c}}, 0x0) 1.94517095s ago: executing program 6 (id=29391): r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$inet(r0, &(0x7f0000001180)={&(0x7f0000000000)={0xa, 0xff00, @empty=0xff000000}, 0xffac, &(0x7f0000001080)=[{&(0x7f0000000040)="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", 0xffa0}, {&(0x7f0000001040)="9d7fcf3efc63f4a6a555ba8b4726d7ccaf8a207100e69cfac4377876021d7131b838059f96bd206d4776368ed2a92432e5af71", 0x33}], 0x2, &(0x7f00000010c0)=[@ip_tos_int={{0x18, 0x29, 0x3b, 0xc9000000}}, @ip_tos_u8={{0x38, 0x29, 0x37}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @loopback}}}], 0x50}, 0x0) 1.94461267s ago: executing program 6 (id=29392): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r1}, &(0x7f0000000540), &(0x7f0000000580)=r2}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r1, &(0x7f0000000780), 0xa00}, 0x20) 1.895303675s ago: executing program 6 (id=29393): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b70400000000000085000000430000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) migrate_pages(0x0, 0xfc, &(0x7f0000000200)=0x7ffffffffffffffd, &(0x7f0000000240)=0x1) writev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)='4', 0x1}], 0x1) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000001540)=@newtaction={0x18, 0x30, 0x829, 0x0, 0x0, {}, [{0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0xc010}, 0x4044040) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000580)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x1, 0x6e9}, 0x1184c, 0x9, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x5, 0xffffffffffffffff, 0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x20, 0x20, &(0x7f0000000280)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffb}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x4}, @jmp={0x5, 0x1, 0x4, 0x0, 0x6, 0x6}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffa}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4}, @ldst={0x3, 0x3, 0x3, 0x7, 0xa, 0x4, 0xfffffffffffffff0}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x29}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], &(0x7f0000000180)='GPL\x00', 0x10001, 0x0, 0x0, 0x40f00, 0x6, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0xd, 0x4, 0x2}, 0x10, 0x0, r2, 0x3, &(0x7f0000000380)=[r0, r0, r0, r0], &(0x7f00000003c0)=[{0x5, 0x2, 0x9}, {0x2, 0x5, 0xb, 0x7}, {0x0, 0x4, 0x10, 0x3}], 0x10, 0x5}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000940)={r3, 0x0, 0x53, 0xfa, &(0x7f0000000500)="b8d14a0a17f71ae3595ae58b52226300c6d2e50b8128c789e9c3dc4b7ec227e4e0f294636e7ecb4902455ca3e2dba01b0436129c7cad72968b09a705e550146acd2c31ed5beb968443f150f4cab130159fbd77", &(0x7f00000007c0)=""/250, 0x7, 0x0, 0x2a, 0x70, &(0x7f0000000400)="cfc5960461e557784b7c99a6ff7548974a8ab62a80403044f029295f54df740e9acccbd7998547d3fb8e", &(0x7f00000008c0)="97e54680a5bf1bfe4010ad70b8a51aa31acb56775a67ea8b4b5dd99cbdd5e8c5db87fafc24294834bbe5b5e5f3d4ec1db99dd9dd038c0c9f8d57dbd1adb5a8616feef2fd7d5692ab1549efe6886b8d96a57673cfe4c91b784faeac1a75830bef05a354a5aacd3135182d8d924c467b01", 0x1, 0x0, 0x3}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000300), 0x0}, 0x20) 1.770652747s ago: executing program 3 (id=29394): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400001cb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) symlink(&(0x7f0000000540)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a30000000002c00038008000140000000000800024000000000180003801400010076657468305f746f5f687372000000005c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c0003801400010076"], 0xfc}}, 0x0) 1.765489297s ago: executing program 3 (id=29395): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000006c0)='kfree\x00'}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) setxattr$system_posix_acl(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='system.posix_acl_default\x00', &(0x7f0000000b40)={{}, {0x1, 0x6}, [], {0x4, 0x4}, [], {0x10, 0x7}, {0x20, 0x1}}, 0x24, 0x0) keyctl$restrict_keyring(0xa, 0x0, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000000)='id\xf7\xff\xffe{') bpf$PROG_LOAD(0x5, 0x0, 0x0) ptrace(0x10, 0x0) ptrace$getregset(0x4212, 0x0, 0x201, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fa540000850000008200000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r0}, 0x18) r1 = memfd_create(&(0x7f0000000100)='\vem\xda\x99R@m\xfc\xfe\x9b#*\xff', 0x0) write(r1, &(0x7f0000000040)="0600", 0x2) sendfile(r1, r1, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f000002eff0)={0x135, &(0x7f0000000000)=[{}]}, 0x10) 1.596254194s ago: executing program 0 (id=29396): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0600000004000000080000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x37e2f4aba9289b81, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6004, 0x1) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0xf4) r4 = dup2(r3, r3) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x200000a, 0x1, 0x8}) ioctl$BLKTRACESETUP(r4, 0x1276, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x100, 0x0, 0x40, 0x2}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYRES8=r2, @ANYRES8=r1], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r5, 0x0, 0x80000}, 0x18) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r8, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r9}, 0x10) open$dir(0x0, 0x0, 0x0) r10 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r10, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @random="53f1e2854e3b"}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x200000b8, &(0x7f0000000b00)=ANY=[@ANYRES8=r6, @ANYRESHEX=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x43}, 0x94) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000380)={0x4, &(0x7f0000000280)=[{0xffff, 0x7, 0x2, 0x4}, {0x101, 0x0, 0x37}, {0x45b, 0x9, 0x80, 0xfffff143}, {0x9, 0xc, 0xdc, 0x7}]}) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='sys_enter\x00', r11}, 0x10) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000100)={0x0, "de442bfc7910e10ac69ac014b0fa7807b11d2c99ed1f40d47a6edb3367b5cc888e1fd5102ae2d3d05f251f8d49025ceab4152b6e6d87cd6088e97a9d06d29143"}, 0x48, 0xffffffffffffffff) 1.526805621s ago: executing program 6 (id=29397): socket$inet6(0xa, 0x3, 0x3c) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x800000, 0x0) r0 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000280)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x1, 0x0, 0x0, 0x0, 0x9]}}, 0x5c) setsockopt$MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x0, 0x0, @local}, {0xa, 0x4e22, 0x800, @empty}, 0x0, {[0x0, 0x8000]}}, 0x5c) setsockopt$MRT6_FLUSH(r0, 0x29, 0xd4, &(0x7f0000000340)=0x6, 0x4) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000300), &(0x7f0000000380), 0x2, 0x1) chroot(&(0x7f0000000100)='./file0\x00') r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00') r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYRES8=r2, @ANYRES32=r2, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000500)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) epoll_create(0x4) 1.390984394s ago: executing program 6 (id=29398): r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000}}, 0x1c) syz_emit_ethernet(0x66, &(0x7f0000000880)={@local, @random="8c00defa00", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00318e", 0x30, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[], @time_exceed={0x2, 0x1, 0x0, 0x0, '\x00', {0x0, 0x6, "050006", 0x97a, 0x3a, 0xff, @mcast1, @empty}}}}}}}, 0x0) (fail_nth: 1) 1.110001292s ago: executing program 1 (id=29399): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r0, 0xe0, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000001580)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, &(0x7f00000015c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001640)=[0x0, 0x0], 0x0, 0xf8, &(0x7f0000001680)=[{}], 0x8, 0x10, &(0x7f00000016c0), &(0x7f0000001700), 0x8, 0x21, 0x8, 0x8, &(0x7f0000001740)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000001540)=ANY=[@ANYRES8=0x0, @ANYRES16=r0, @ANYRESHEX=r1, @ANYRES32=r1, @ANYRES16=r1], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='task\x00') lseek(r3, 0x3, 0x1) getdents64(r3, &(0x7f0000002540)=""/4096, 0x1000) r4 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_INIT(r4, 0x29, 0xc8, &(0x7f0000000340), 0x4) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r5}, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00'}, 0x10) syz_mount_image$ext4(&(0x7f00000007c0)='ext4\x00', &(0x7f00000006c0)='./file1\x00', 0x40, &(0x7f00000000c0)={[{@user_xattr}, {@nodioread_nolock}]}, 0x1, 0x576, &(0x7f0000000140)="$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") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="180000000200000000000000ffffffff952d96e7d800000000000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) kexec_load(0x3e00, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x2}, &(0x7f0000bbdffc)=0x0) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) readv(r8, &(0x7f0000000100)=[{&(0x7f00000002c0)=""/215, 0xd7}], 0x1) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r7, 0x1, &(0x7f0000000040), 0x0) futex(&(0x7f000000cffc)=0x1, 0x86, 0x2, 0x0, 0x0, 0xfffffffc) 1.087273704s ago: executing program 6 (id=29400): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), r0) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="40010000", @ANYRES16=r1, @ANYBLOB="010028bd7000fbdbdf250f0000000c0009800800010005000000040003803c0007"], 0x140}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) 1.034565119s ago: executing program 43 (id=29400): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), r0) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="40010000", @ANYRES16=r1, @ANYBLOB="010028bd7000fbdbdf250f0000000c0009800800010005000000040003803c0007"], 0x140}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) 846.536927ms ago: executing program 3 (id=29402): socket$kcm(0x10, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0x1}, 0x800fffd}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x7, @loopback, 0x23}, 0x1c) r1 = dup(r0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000000)=ANY=[], 0x78}, 0x1, 0x0, 0x0, 0x4080}, 0x8080) sendto$inet(r1, &(0x7f0000000240)="911b403f8625e4aed2460090f709b508dc3d27c650e4f0f582f148cf010000006d", 0x21, 0x4000084, 0x0, 0x0) r2 = socket(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty, 0x4000002}, 0x1c) syz_emit_ethernet(0x6e, &(0x7f00000001c0)=ANY=[@ANYBLOB="cfb14e407d33ffffffffffff86dd697a262d00383afe090000000000000000000000000000aaff02000000000000000000000000000102009078feab5023ec9f38480009ff0000000000000011000000000000000001000000000000000000000000000000013b000a1865000000"], 0x0) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0xffffffffffffffa0, 0xfa00, {0xffffffffffffffff, 0x10c}}, 0xfffffd88) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x8, 0xf9, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, 0x0, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r5 = syz_open_dev$usbfs(0x0, 0x204, 0x82) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1000002, 0x11012, r5, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r6 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10003, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x497, 0x0, @perf_bp={0x0}, 0x100202, 0x0, 0xfffffffb, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYRES64=r5, @ANYBLOB="86c65d2486435a43ef004bd982c2f6c2f89e7a25722353e5b660fc9161820429068bb5b82faf01590a09c43eac1f7a9f58769e27e4754a929893a57020607fc796485adde6c27e970a762bec6845e5ef7a1e71a96695", @ANYRES64=r2, @ANYRES64=r1, @ANYRES32=r3], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7}, &(0x7f0000000180), &(0x7f00000001c0)=r6}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) vmsplice(r4, 0x0, 0x0, 0x1) syz_emit_ethernet(0x5e, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd6002000000280600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="a002000090780000011304e2cd220cce2781a9dfe9bc8597d900000090a2c98c65307e20338770ead03f287b9905964bdb396a280db76122111011ca50e8c6b1d10ea3de2b194c6d6504a6f740333575871e801c15f23be223c3e85f"], 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) acct(0x0) 770.930705ms ago: executing program 3 (id=29403): syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000640)='./file0\x00', 0x3014850, &(0x7f0000000080)={[{@acl}, {@barrier_val={'barrier', 0x3d, 0x1000}}, {@grpjquota}, {@norecovery}, {@dioread_lock}]}, 0x3, 0x4d1, &(0x7f0000000680)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x7, 0x4, 0x8, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x4a0, 0x0, 0xffffffff, 0xffffffff, 0x1e8, 0xffffffff, 0x3d0, 0xffffffff, 0xffffffff, 0x3d0, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@remote, @loopback, [0xff, 0xff, 0xff, 0xff], [0xff000000, 0xff, 0xff], 'team_slave_0\x00', 'netdevsim0\x00', {}, {0xff}, 0x29, 0x3, 0x0, 0x60}, 0x0, 0x1a0, 0x1e8, 0x60030000, {0x0, 0xff000000}, [@common=@inet=@recent0={{0xf8}, {0x9, 0x0, 0x24, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x4, 0x7a3, 0x6, 'snmp_trap\x00', {0x369bc443}}}}, {{@ipv6={@remote, @local, [0xffffff00, 0xffffffff, 0x0, 0xffffff00], [0xffffffff, 0xffffff00, 0xffffffff, 0xff000000], 'netpci0\x00', 'bridge_slave_1\x00', {}, {0xff}, 0x2b, 0x2, 0x5, 0x5}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x1, 'syz0\x00', 0xfe}}, @inet=@rpfilter={{0x28}, {0x1c}}]}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x542) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, 0x0, 0x4040004) r6 = epoll_create1(0x0) r7 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r7, &(0x7f0000000100)={0xa000000d}) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r8, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)={0x28, r9, 0xacf5e67dd0b583a1, 0x0, 0x0, {{0x5}, {@val={0x8}, @val={0xc, 0x99, {0x0, 0xffffffff}}}}}, 0x28}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x1a08700, &(0x7f0000000700)={[{@nodioread_nolock}, {@nouid32}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5c}}, {@nouid32}, {@resgid}, {@usrquota}, {@journal_dev={'journal_dev', 0x3d, 0x1}}]}, 0x0, 0x470, &(0x7f0000001040)="$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") socket$key(0xf, 0x3, 0x2) 669.844774ms ago: executing program 0 (id=29404): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x3}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000400028008000a00bc"], 0x40}}, 0x0) (fail_nth: 11) 36.629976ms ago: executing program 1 (id=29405): setxattr$incfs_metadata(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200), &(0x7f00000002c0)="d83b6d74d2f24dd2325464d330385e104382c5a79b24403fe7b6a5870aea99bfeaa3a06f6e7f16408fe132ba72215ac6d0fdb311f615b86278dc3702c94020f39521031c9bf46fc39e8cd1b0463b6081fb5b5872a6eca687d75b279675871b3e4431aac758690bf8a87c33b8d7569e04ce314cb6926490d895ab85bc6a3ac99f2a099c4f68", 0x85, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB='P\x00\x00\x00'], 0x50}, 0x1, 0x0, 0x0, 0x20000810}, 0x2400c800) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1428437b3c8026bdfeb6db4ee9bcb25b1811d40a203bf40b3a7da5a8a64db04ed6dd26eea2a37229c339b1f91201c2796", 0x3d}], 0x1, 0x0, 0x0, 0x4004050}, 0x0) recvmsg(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) close(r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00'}, 0x10) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x6000, 0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = dup2(r3, r3) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000240)={'\x00', 0x40, 0xa, 0x1, 0x40000000, 0x10}) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) 785.85µs ago: executing program 3 (id=29406): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f00000001c0)={0x0, 0x25, &(0x7f0000000c40)={&(0x7f00000003c0)={0x54, r1, 0x1, 0x70bd2b, 0xfffffffe, {0x1e}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3e}, {0xc, 0x8f, 0xfffffffffffffffc}, {0xc, 0x90, 0x9}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000081}, 0x20044010) 0s ago: executing program 1 (id=29407): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000080000000c"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="18010000000000000000000000080021850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0xd) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) sendfile(r3, r2, 0x0, 0x8) (fail_nth: 1) kernel console output (not intermixed with test programs): .902529][ T29] audit: type=1326 audit(1821.870:310933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19660 comm="syz.9.28830" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f79bc70efc9 code=0x7ffc0000 [ 1750.925826][ T29] audit: type=1326 audit(1821.870:310934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19660 comm="syz.9.28830" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f79bc70efc9 code=0x7ffc0000 [ 1750.949928][ T29] audit: type=1326 audit(1821.870:310935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19660 comm="syz.9.28830" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f79bc70efc9 code=0x7ffc0000 [ 1751.088181][T19675] loop2: detected capacity change from 0 to 512 [ 1751.198719][T19675] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1751.265740][T19675] 9pnet_fd: Insufficient options for proto=fd [ 1751.581777][T19691] tipc: Enabling of bearer rejected, failed to enable media [ 1752.318480][T19705] 9pnet_fd: Insufficient options for proto=fd [ 1752.949875][T18695] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1753.947624][T19733] 9pnet_fd: Insufficient options for proto=fd [ 1753.959627][T19731] 9pnet_fd: Insufficient options for proto=fd [ 1754.051206][T19735] syzkaller0: entered promiscuous mode [ 1754.057396][T19735] syzkaller0: entered allmulticast mode [ 1754.188874][T19727] lo speed is unknown, defaulting to 1000 [ 1754.196958][T19729] lo speed is unknown, defaulting to 1000 [ 1754.206813][T19727] lo speed is unknown, defaulting to 1000 [ 1754.277164][T19729] lo speed is unknown, defaulting to 1000 [ 1754.378019][T19750] loop2: detected capacity change from 0 to 1024 [ 1754.395434][T19727] ip6_vti0 speed is unknown, defaulting to 1000 [ 1754.435576][T19750] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1754.544694][T19729] ip6_vti0 speed is unknown, defaulting to 1000 [ 1754.571275][T19764] netlink: 24 bytes leftover after parsing attributes in process `syz.5.28868'. [ 1754.648903][T19764] netlink: 68 bytes leftover after parsing attributes in process `syz.5.28868'. [ 1754.679478][T19768] 9pnet_fd: Insufficient options for proto=fd [ 1754.794759][T19774] netlink: 24 bytes leftover after parsing attributes in process `syz.7.28871'. [ 1755.054897][T19775] vhci_hcd vhci_hcd.0: pdev(6) rhport(0) sockfd(8) [ 1755.061471][T19775] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 1755.069659][T19775] vhci_hcd vhci_hcd.0: Device attached [ 1755.276459][T19779] vhci_hcd: connection closed [ 1755.283830][T11970] vhci_hcd: stop threads [ 1755.293889][T11970] vhci_hcd: release socket [ 1755.298382][T11970] vhci_hcd: disconnect device [ 1755.340593][T26296] usb 13-1: new low-speed USB device number 12 using vhci_hcd [ 1755.350188][T26296] usb 13-1: enqueue for inactive port 0 [ 1755.355902][T26296] usb 13-1: enqueue for inactive port 0 [ 1755.394748][T26296] usb 13-1: enqueue for inactive port 0 [ 1755.493769][T26296] vhci_hcd: vhci_device speed not set [ 1755.524196][T19759] EXT4-fs error (device loop2): ext4_mb_generate_buddy:1289: group 0, block bitmap and bg descriptor inconsistent: 21 vs 268369941 free clusters [ 1755.876068][T19800] netlink: 24 bytes leftover after parsing attributes in process `syz.5.28879'. [ 1755.918766][T19799] syzkaller0: entered promiscuous mode [ 1755.924949][T19799] syzkaller0: entered allmulticast mode [ 1756.073946][T19800] netlink: 68 bytes leftover after parsing attributes in process `syz.5.28879'. [ 1756.109019][T19807] 9pnet_fd: Insufficient options for proto=fd [ 1756.522410][T19809] netlink: 24 bytes leftover after parsing attributes in process `syz.7.28882'. [ 1756.639650][ T29] kauditd_printk_skb: 210 callbacks suppressed [ 1756.639670][ T29] audit: type=1326 audit(1827.991:311146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19810 comm="syz.9.28884" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f79bc70efc9 code=0x7ffc0000 [ 1756.736443][ T29] audit: type=1326 audit(1827.991:311147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19810 comm="syz.9.28884" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f79bc70efc9 code=0x7ffc0000 [ 1756.760544][ T29] audit: type=1326 audit(1828.001:311148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19810 comm="syz.9.28884" exe="/root/syz-executor" sig=0 arch=c000003e syscall=280 compat=0 ip=0x7f79bc70efc9 code=0x7ffc0000 [ 1756.784093][ T29] audit: type=1326 audit(1828.001:311149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19810 comm="syz.9.28884" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f79bc70efc9 code=0x7ffc0000 [ 1756.808361][ T29] audit: type=1326 audit(1828.001:311150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19810 comm="syz.9.28884" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f79bc70efc9 code=0x7ffc0000 [ 1756.832002][ T29] audit: type=1326 audit(1828.001:311151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19810 comm="syz.9.28884" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f79bc70efc9 code=0x7ffc0000 [ 1756.856148][ T29] audit: type=1326 audit(1828.001:311152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19810 comm="syz.9.28884" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f79bc70efc9 code=0x7ffc0000 [ 1756.879596][ T29] audit: type=1326 audit(1828.001:311153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19810 comm="syz.9.28884" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f79bc70efc9 code=0x7ffc0000 [ 1756.903879][ T29] audit: type=1326 audit(1828.001:311154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19810 comm="syz.9.28884" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f79bc70efc9 code=0x7ffc0000 [ 1756.927270][ T29] audit: type=1326 audit(1828.033:311155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19810 comm="syz.9.28884" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f79bc70efc9 code=0x7ffc0000 [ 1757.283550][T18695] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1757.495580][T19840] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(8) [ 1757.502156][T19840] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 1757.519215][T19840] vhci_hcd vhci_hcd.0: Device attached [ 1757.529093][T19832] lo speed is unknown, defaulting to 1000 [ 1757.543767][T19832] lo speed is unknown, defaulting to 1000 [ 1757.578854][T19849] vhci_hcd: connection closed [ 1757.579128][T11970] vhci_hcd: stop threads [ 1757.588392][T11970] vhci_hcd: release socket [ 1757.592844][T11970] vhci_hcd: disconnect device [ 1757.645450][T19857] netlink: 24 bytes leftover after parsing attributes in process `syz.6.28895'. [ 1757.755548][T19832] ip6_vti0 speed is unknown, defaulting to 1000 [ 1757.808928][T19863] usb usb1: usbfs: process 19863 (syz.9.28893) did not claim interface 4 before use [ 1758.009439][T11937] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1758.056337][T19832] chnl_net:caif_netlink_parms(): no params data found [ 1758.102706][T11937] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1758.166931][T11937] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1758.261686][T11937] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1758.278512][T19887] netlink: 24 bytes leftover after parsing attributes in process `syz.2.28906'. [ 1758.292499][T19832] bridge0: port 1(bridge_slave_0) entered blocking state [ 1758.299822][T19832] bridge0: port 1(bridge_slave_0) entered disabled state [ 1758.320646][T19832] bridge_slave_0: entered allmulticast mode [ 1758.336907][T19832] bridge_slave_0: entered promiscuous mode [ 1758.354010][T19832] bridge0: port 2(bridge_slave_1) entered blocking state [ 1758.361481][T19832] bridge0: port 2(bridge_slave_1) entered disabled state [ 1758.369032][T19832] bridge_slave_1: entered allmulticast mode [ 1758.375929][T19832] bridge_slave_1: entered promiscuous mode [ 1758.417787][T19893] loop2: detected capacity change from 0 to 512 [ 1758.428447][T19832] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1758.466850][T19832] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1758.488683][T19893] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1758.501385][T11937] bridge_slave_1: left allmulticast mode [ 1758.507855][T11937] bridge_slave_1: left promiscuous mode [ 1758.513680][T11937] bridge0: port 2(bridge_slave_1) entered disabled state [ 1758.542261][T11937] bridge_slave_0: left allmulticast mode [ 1758.543600][T19893] 9pnet_fd: Insufficient options for proto=fd [ 1758.547961][T11937] bridge_slave_0: left promiscuous mode [ 1758.560644][T11937] bridge0: port 1(bridge_slave_0) entered disabled state [ 1758.753402][T18695] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1758.824501][T11937] team0: Port device geneve1 removed [ 1758.922646][T19909] loop2: detected capacity change from 0 to 8192 [ 1759.061641][T11937]  (unregistering): (slave bond_slave_0): Releasing backup interface [ 1759.088465][T11937]  (unregistering): (slave bond_slave_1): Releasing backup interface [ 1759.104970][T11937]  (unregistering): (slave dummy0): Releasing backup interface [ 1759.120867][T11937]  (unregistering): Released all slaves [ 1759.219909][T19832] team0: Port device team_slave_0 added [ 1759.248727][T19832] team0: Port device team_slave_1 added [ 1759.298794][T11937] tipc: Left network mode [ 1759.309072][T19832] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1759.316094][T19832] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1759.342175][T19832] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1759.427201][T19832] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1759.434451][T19832] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1759.460915][T19832] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1759.593759][T19832] hsr_slave_0: entered promiscuous mode [ 1759.625723][T19832] hsr_slave_1: entered promiscuous mode [ 1759.646104][T19832] debugfs: 'hsr0' already exists in 'hsr' [ 1759.651887][T19832] Cannot create hsr debugfs directory [ 1759.897038][T11937] hsr_slave_0: left promiscuous mode [ 1759.911714][T11937] veth1_macvtap: left promiscuous mode [ 1759.917303][T11937] veth0_macvtap: left promiscuous mode [ 1759.929610][T11937] veth1_vlan: left promiscuous mode [ 1759.948597][T11937] veth0_vlan: left promiscuous mode [ 1760.161650][T11937] pimreg (unregistering): left allmulticast mode [ 1760.306723][T11937] team0 (unregistering): Port device team_slave_1 removed [ 1760.340870][T11937] team0 (unregistering): Port device team_slave_0 removed [ 1760.632881][T19977] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.28949'. [ 1760.693031][T19978] usb usb1: usbfs: process 19978 (syz.9.28938) did not claim interface 4 before use [ 1760.755817][T19983] veth0_to_team: entered promiscuous mode [ 1760.937667][T19832] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 1760.946683][T19992] 9pnet_fd: Insufficient options for proto=fd [ 1760.956117][T19832] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 1760.972831][T19832] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 1761.049008][T19832] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 1761.410570][ T29] kauditd_printk_skb: 273 callbacks suppressed [ 1761.410588][ T29] audit: type=1326 audit(1833.009:311429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19994 comm="syz.2.28944" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fade3f2efc9 code=0x7ffc0000 [ 1761.506972][ T29] audit: type=1326 audit(1833.009:311430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19994 comm="syz.2.28944" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fade3f2efc9 code=0x7ffc0000 [ 1761.531419][ T29] audit: type=1326 audit(1833.009:311431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19994 comm="syz.2.28944" exe="/root/syz-executor" sig=0 arch=c000003e syscall=426 compat=0 ip=0x7fade3f2efc9 code=0x7ffc0000 [ 1761.555088][ T29] audit: type=1326 audit(1833.009:311432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19994 comm="syz.2.28944" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fade3f2efc9 code=0x7ffc0000 [ 1761.579321][ T29] audit: type=1326 audit(1833.019:311433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19994 comm="syz.2.28944" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fade3f2efc9 code=0x7ffc0000 [ 1761.602687][ T29] audit: type=1326 audit(1833.019:311434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19994 comm="syz.2.28944" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fade3f2efc9 code=0x7ffc0000 [ 1761.646759][T19832] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1761.672726][T19832] 8021q: adding VLAN 0 to HW filter on device team0 [ 1761.733904][ T7041] bridge0: port 1(bridge_slave_0) entered blocking state [ 1761.741032][ T7041] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1761.805168][ T7041] bridge0: port 2(bridge_slave_1) entered blocking state [ 1761.812316][ T7041] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1762.072449][T19832] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1762.294177][T20026] usb usb1: usbfs: process 20026 (syz.2.28951) did not claim interface 4 before use [ 1762.755300][T19832] veth0_vlan: entered promiscuous mode [ 1762.811857][T19832] veth1_vlan: entered promiscuous mode [ 1762.961014][T19832] veth0_macvtap: entered promiscuous mode [ 1762.970850][T20049] 9pnet_fd: Insufficient options for proto=fd [ 1763.024788][T19832] veth1_macvtap: entered promiscuous mode [ 1763.104209][T19832] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1763.161583][T19832] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1763.275817][T11937] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1763.351464][T11937] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1763.414934][T11937] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1763.463327][T11937] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1763.487117][ T29] audit: type=1400 audit(1835.182:311435): avc: denied { write } for pid=19832 comm="syz-executor" name="cgroup.procs" dev="cgroup" ino=298 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object" [ 1763.513229][ T29] audit: type=1400 audit(1835.182:311436): avc: denied { open } for pid=19832 comm="syz-executor" path="/syzcgroup/cpu/syz5/cgroup.procs" dev="cgroup" ino=298 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object" [ 1763.630826][T20057] netlink: 24 bytes leftover after parsing attributes in process `syz.2.28958'. [ 1763.719414][ T29] audit: type=1326 audit(1835.266:311437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20053 comm="syz.7.28957" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f33a80cefc9 code=0x7ffc0000 [ 1763.743731][ T29] audit: type=1326 audit(1835.266:311438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20053 comm="syz.7.28957" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f33a80cefc9 code=0x7ffc0000 [ 1763.871533][T20067] netlink: 28 bytes leftover after parsing attributes in process `syz.6.28961'. [ 1763.937377][T20067] netlink: 68 bytes leftover after parsing attributes in process `syz.6.28961'. [ 1764.733010][ T7041] bond0 (unregistering): Released all slaves [ 1764.809012][ T7041] bond1 (unregistering): Released all slaves [ 1765.010788][T20069] lo speed is unknown, defaulting to 1000 [ 1765.104279][T20069] lo speed is unknown, defaulting to 1000 [ 1765.536178][T20104] vhci_hcd vhci_hcd.0: pdev(6) rhport(0) sockfd(8) [ 1765.542778][T20104] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 1765.550855][T20104] vhci_hcd vhci_hcd.0: Device attached [ 1765.695419][T20107] vhci_hcd: connection closed [ 1765.697394][T11977] vhci_hcd: stop threads [ 1765.706460][T11977] vhci_hcd: release socket [ 1765.710929][T11977] vhci_hcd: disconnect device [ 1765.750928][T13716] vhci_hcd: vhci_device speed not set [ 1765.888610][T20117] netlink: 28 bytes leftover after parsing attributes in process `syz.5.28976'. [ 1765.936864][T20117] netlink: 68 bytes leftover after parsing attributes in process `syz.5.28976'. [ 1765.953226][T20069] chnl_net:caif_netlink_parms(): no params data found [ 1766.040054][T20069] bridge0: port 1(bridge_slave_0) entered blocking state [ 1766.047213][T20069] bridge0: port 1(bridge_slave_0) entered disabled state [ 1766.074885][T20069] bridge_slave_0: entered allmulticast mode [ 1766.084942][T20069] bridge_slave_0: entered promiscuous mode [ 1766.115170][T20069] bridge0: port 2(bridge_slave_1) entered blocking state [ 1766.122567][T20069] bridge0: port 2(bridge_slave_1) entered disabled state [ 1766.155972][T20069] bridge_slave_1: entered allmulticast mode [ 1766.196312][T20069] bridge_slave_1: entered promiscuous mode [ 1766.296734][T20069] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1766.333029][ T7041] hsr_slave_0: left promiscuous mode [ 1766.347706][ T7041] hsr_slave_1: left promiscuous mode [ 1766.432048][ T7041] pimreg (unregistering): left allmulticast mode [ 1766.589869][T20145] SELinux: failed to load policy [ 1767.010783][T20069] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1767.204241][T20069] team0: Port device team_slave_0 added [ 1767.232909][T20069] team0: Port device team_slave_1 added [ 1767.366482][T20163] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(8) [ 1767.373056][T20163] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 1767.381103][T20069] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1767.385810][T20163] vhci_hcd vhci_hcd.0: Device attached [ 1767.388081][T20069] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1767.388119][T20069] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1767.389387][T20069] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1767.438051][T20069] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1767.464049][T20069] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1767.506561][T20167] vhci_hcd: connection closed [ 1767.506999][T11964] vhci_hcd: stop threads [ 1767.516231][T11964] vhci_hcd: release socket [ 1767.521033][T11964] vhci_hcd: disconnect device [ 1767.579590][T26296] vhci_hcd: vhci_device speed not set [ 1767.630681][T20069] hsr_slave_0: entered promiscuous mode [ 1767.802169][T20195] SELinux: failed to load policy [ 1767.812522][T20069] hsr_slave_1: entered promiscuous mode [ 1767.819519][T20069] debugfs: 'hsr0' already exists in 'hsr' [ 1767.825323][T20069] Cannot create hsr debugfs directory [ 1767.977421][ T29] kauditd_printk_skb: 48 callbacks suppressed [ 1767.977441][ T29] audit: type=1400 audit(1839.895:311487): avc: denied { associate } for pid=20197 comm="syz.5.29001" name="cgroup.controllers" dev="tmpfs" ino=68 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="@" [ 1768.120153][T20204] loop2: detected capacity change from 0 to 8192 [ 1768.247072][T20069] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 1768.279289][T20069] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 1768.297787][T20069] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 1768.315164][T20069] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 1768.429072][T20069] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1768.472083][T20069] 8021q: adding VLAN 0 to HW filter on device team0 [ 1768.508105][T11964] bridge0: port 1(bridge_slave_0) entered blocking state [ 1768.515324][T11964] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1768.538559][T11964] bridge0: port 2(bridge_slave_1) entered blocking state [ 1768.545720][T11964] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1768.558119][ T29] audit: type=1326 audit(1840.494:311488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20226 comm="syz.2.29011" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fade3f2efc9 code=0x7ffc0000 [ 1768.581516][ T29] audit: type=1326 audit(1840.494:311489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20226 comm="syz.2.29011" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fade3f2efc9 code=0x7ffc0000 [ 1768.604855][ T29] audit: type=1326 audit(1840.494:311490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20226 comm="syz.2.29011" exe="/root/syz-executor" sig=0 arch=c000003e syscall=280 compat=0 ip=0x7fade3f2efc9 code=0x7ffc0000 [ 1768.628778][ T29] audit: type=1326 audit(1840.494:311491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20226 comm="syz.2.29011" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fade3f2efc9 code=0x7ffc0000 [ 1768.652070][ T29] audit: type=1326 audit(1840.494:311492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20226 comm="syz.2.29011" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fade3f2efc9 code=0x7ffc0000 [ 1768.675404][ T29] audit: type=1326 audit(1840.494:311493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20226 comm="syz.2.29011" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fade3f2efc9 code=0x7ffc0000 [ 1768.678514][T20069] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1768.698886][ T29] audit: type=1326 audit(1840.494:311494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20226 comm="syz.2.29011" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fade3f2efc9 code=0x7ffc0000 [ 1768.698965][ T29] audit: type=1326 audit(1840.494:311495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20226 comm="syz.2.29011" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fade3f2efc9 code=0x7ffc0000 [ 1768.699063][ T29] audit: type=1326 audit(1840.494:311496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20226 comm="syz.2.29011" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fade3f2efc9 code=0x7ffc0000 [ 1768.781316][T20069] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1768.848973][T20230] SELinux: failed to load policy [ 1768.913875][T20232] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(8) [ 1768.914135][T20243] netlink: 224 bytes leftover after parsing attributes in process `syz.6.29016'. [ 1768.920480][T20232] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 1768.921257][T20232] vhci_hcd vhci_hcd.0: Device attached [ 1768.961646][T20243] netlink: 16 bytes leftover after parsing attributes in process `syz.6.29016'. [ 1768.970984][T20243] tipc: Started in network mode [ 1768.976069][T20243] tipc: Node identity fffffe01, cluster identity 64 [ 1768.983546][T20243] tipc: Node number set to 4294966785 [ 1769.014173][T20243] tipc: Cannot configure node identity twice [ 1769.014497][T20252] netlink: 'syz.6.29016': attribute type 10 has an invalid length. [ 1769.043306][T20252] bond0: (slave dummy0): Releasing backup interface [ 1769.060748][T20244] vhci_hcd: connection closed [ 1769.061365][T11937] vhci_hcd: stop threads [ 1769.070516][T11937] vhci_hcd: release socket [ 1769.074948][T11937] vhci_hcd: disconnect device [ 1769.080989][T20243] netlink: 'syz.6.29016': attribute type 10 has an invalid length. [ 1769.099627][T20252] team0: Port device dummy0 added [ 1769.117421][T20243] team0: Port device dummy0 removed [ 1769.123144][T13716] vhci_hcd: vhci_device speed not set [ 1769.145261][T20243] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 1769.183521][T20069] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1769.242065][T20257] netlink: 68 bytes leftover after parsing attributes in process `syz.9.29027'. [ 1769.611219][T20069] veth0_vlan: entered promiscuous mode [ 1769.664020][T20069] veth1_vlan: entered promiscuous mode [ 1769.720482][T20069] veth0_macvtap: entered promiscuous mode [ 1769.778345][T20069] veth1_macvtap: entered promiscuous mode [ 1769.827744][T20069] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1769.868627][T20069] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1769.905864][T11937] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1770.155340][T20280] pimreg: entered allmulticast mode [ 1770.179553][T11937] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1770.325915][T11937] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1770.362963][T11937] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1770.395085][T20295] loop2: detected capacity change from 0 to 2048 [ 1770.420080][T20280] usb usb1: usbfs: process 20280 (syz.5.29022) did not claim interface 4 before use [ 1770.448016][T20295] loop2: p1 < > p4 [ 1770.454048][T20295] loop2: p4 size 8388608 extends beyond EOD, truncated [ 1770.560298][T20303] netlink: 224 bytes leftover after parsing attributes in process `syz.5.29028'. [ 1770.569842][T20303] netlink: 16 bytes leftover after parsing attributes in process `syz.5.29028'. [ 1770.578994][T20303] tipc: Started in network mode [ 1770.583975][T20303] tipc: Node identity fffffe01, cluster identity 64 [ 1770.590720][T20303] tipc: Node number set to 4294966785 [ 1770.597865][T20303] tipc: Cannot configure node identity twice [ 1770.612720][T20306] netlink: 'syz.5.29028': attribute type 10 has an invalid length. [ 1770.628473][T20306] team0: Port device dummy0 added [ 1770.642630][T20303] netlink: 'syz.5.29028': attribute type 10 has an invalid length. [ 1770.655832][T20303] team0: Port device dummy0 removed [ 1770.662656][T20307] loop2: detected capacity change from 0 to 512 [ 1770.672337][T20303] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 1770.688128][T20307] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1770.743339][T20307] 9pnet_fd: Insufficient options for proto=fd [ 1770.815573][T20312] SELinux: failed to load policy [ 1770.834661][T20314] SELinux: failed to load policy [ 1770.950353][T20317] netlink: 'syz.9.29032': attribute type 1 has an invalid length. [ 1770.981822][T20317] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1771.011974][T20317] netlink: 4 bytes leftover after parsing attributes in process `syz.9.29032'. [ 1771.071301][T20317] bond1 (unregistering): Released all slaves [ 1771.445943][T18695] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1771.503288][T20343] SELinux: failed to load policy [ 1771.538531][T20347] pimreg: entered allmulticast mode [ 1771.585714][T20346] loop2: detected capacity change from 0 to 1024 [ 1771.611342][T20346] netlink: 68 bytes leftover after parsing attributes in process `syz.2.29042'. [ 1771.835544][T20355] usb usb1: usbfs: process 20355 (syz.7.29041) did not claim interface 4 before use [ 1771.910676][T20360] netlink: 24 bytes leftover after parsing attributes in process `syz.6.29047'. [ 1771.985261][T20363] FAULT_INJECTION: forcing a failure. [ 1771.985261][T20363] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1771.998571][T20363] CPU: 1 UID: 0 PID: 20363 Comm: syz.6.29049 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1771.998606][T20363] Tainted: [W]=WARN [ 1771.998659][T20363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1771.998673][T20363] Call Trace: [ 1771.998680][T20363] [ 1771.998746][T20363] __dump_stack+0x1d/0x30 [ 1771.998781][T20363] dump_stack_lvl+0xe8/0x140 [ 1771.998844][T20363] dump_stack+0x15/0x1b [ 1771.998867][T20363] should_fail_ex+0x265/0x280 [ 1771.998910][T20363] should_fail+0xb/0x20 [ 1771.998945][T20363] should_fail_usercopy+0x1a/0x20 [ 1771.999001][T20363] _copy_from_iter+0xd2/0xe80 [ 1771.999027][T20363] ? __build_skb_around+0x1ab/0x200 [ 1771.999135][T20363] ? __alloc_skb+0x223/0x320 [ 1771.999168][T20363] netlink_sendmsg+0x471/0x6b0 [ 1771.999293][T20363] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1771.999334][T20363] __sock_sendmsg+0x145/0x180 [ 1771.999435][T20363] ____sys_sendmsg+0x31e/0x4e0 [ 1771.999469][T20363] ___sys_sendmsg+0x17b/0x1d0 [ 1771.999522][T20363] __x64_sys_sendmsg+0xd4/0x160 [ 1771.999562][T20363] x64_sys_call+0x191e/0x3000 [ 1771.999649][T20363] do_syscall_64+0xd2/0x200 [ 1771.999681][T20363] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1771.999785][T20363] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1771.999813][T20363] RIP: 0033:0x7f5d74e1efc9 [ 1771.999834][T20363] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1771.999859][T20363] RSP: 002b:00007f5d7387f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1771.999950][T20363] RAX: ffffffffffffffda RBX: 00007f5d75075fa0 RCX: 00007f5d74e1efc9 [ 1771.999963][T20363] RDX: 0000000000040094 RSI: 0000200000006040 RDI: 0000000000000008 [ 1771.999976][T20363] RBP: 00007f5d7387f090 R08: 0000000000000000 R09: 0000000000000000 [ 1771.999992][T20363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1772.000010][T20363] R13: 00007f5d75076038 R14: 00007f5d75075fa0 R15: 00007ffef1dfff28 [ 1772.000037][T20363] [ 1772.867814][T20386] SELinux: failed to load policy [ 1772.872309][T20383] syzkaller0: entered promiscuous mode [ 1772.878852][T20383] syzkaller0: entered allmulticast mode [ 1773.036812][ T29] kauditd_printk_skb: 162 callbacks suppressed [ 1773.036829][ T29] audit: type=1326 audit(1845.207:311659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20387 comm="syz.7.29057" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fadddddefc9 code=0x7ffc0000 [ 1773.138813][ T29] audit: type=1326 audit(1845.207:311660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20387 comm="syz.7.29057" exe="/root/syz-executor" sig=0 arch=c000003e syscall=280 compat=0 ip=0x7fadddddefc9 code=0x7ffc0000 [ 1773.162257][ T29] audit: type=1326 audit(1845.207:311661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20387 comm="syz.7.29057" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fadddddefc9 code=0x7ffc0000 [ 1773.185560][ T29] audit: type=1326 audit(1845.207:311662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20387 comm="syz.7.29057" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fadddddefc9 code=0x7ffc0000 [ 1773.209203][ T29] audit: type=1326 audit(1845.218:311663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20387 comm="syz.7.29057" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fadddddefc9 code=0x7ffc0000 [ 1773.232606][ T29] audit: type=1326 audit(1845.218:311664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20387 comm="syz.7.29057" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fadddddefc9 code=0x7ffc0000 [ 1773.256239][ T29] audit: type=1326 audit(1845.218:311665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20387 comm="syz.7.29057" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fadddddefc9 code=0x7ffc0000 [ 1773.279656][ T29] audit: type=1326 audit(1845.270:311666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20387 comm="syz.7.29057" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fadddddefc9 code=0x7ffc0000 [ 1773.295427][T20395] netlink: 24 bytes leftover after parsing attributes in process `syz.5.29059'. [ 1773.303178][ T29] audit: type=1326 audit(1845.270:311667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20387 comm="syz.7.29057" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fadddddefc9 code=0x7ffc0000 [ 1773.335263][ T29] audit: type=1326 audit(1845.270:311668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20387 comm="syz.7.29057" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fadddddefc9 code=0x7ffc0000 [ 1773.374016][T20397] netlink: 224 bytes leftover after parsing attributes in process `syz.9.29058'. [ 1773.384544][T20397] netlink: 16 bytes leftover after parsing attributes in process `syz.9.29058'. [ 1773.394300][T20397] tipc: Started in network mode [ 1773.399167][T20397] tipc: Node identity fffffe01, cluster identity 64 [ 1773.405798][T20397] tipc: Node number set to 4294966785 [ 1773.423009][T20397] tipc: Cannot configure node identity twice [ 1773.435383][T20401] loop2: detected capacity change from 0 to 1024 [ 1773.444864][T20401] netlink: 68 bytes leftover after parsing attributes in process `syz.2.29061'. [ 1773.562912][T20413] netlink: 24 bytes leftover after parsing attributes in process `syz.6.29067'. [ 1773.767211][T20418] syzkaller0: entered promiscuous mode [ 1773.772802][T20418] syzkaller0: entered allmulticast mode [ 1774.198051][T20449] netlink: 40 bytes leftover after parsing attributes in process `syz.6.29082'. [ 1774.243166][T20449] netlink: 68 bytes leftover after parsing attributes in process `syz.6.29082'. [ 1774.862053][T20464] FAULT_INJECTION: forcing a failure. [ 1774.862053][T20464] name failslab, interval 1, probability 0, space 0, times 0 [ 1774.874819][T20464] CPU: 1 UID: 0 PID: 20464 Comm: syz.6.29088 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1774.874937][T20464] Tainted: [W]=WARN [ 1774.874947][T20464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1774.874964][T20464] Call Trace: [ 1774.874973][T20464] [ 1774.874984][T20464] __dump_stack+0x1d/0x30 [ 1774.875012][T20464] dump_stack_lvl+0xe8/0x140 [ 1774.875039][T20464] dump_stack+0x15/0x1b [ 1774.875061][T20464] should_fail_ex+0x265/0x280 [ 1774.875165][T20464] should_failslab+0x8c/0xb0 [ 1774.875277][T20464] kmem_cache_alloc_noprof+0x50/0x480 [ 1774.875306][T20464] ? __inet_hash_connect+0x7a0/0x1370 [ 1774.875338][T20464] ? inet_sk_get_local_port_range+0x89/0x100 [ 1774.875447][T20464] __inet_hash_connect+0x7a0/0x1370 [ 1774.875481][T20464] ? __pfx___inet6_check_established+0x10/0x10 [ 1774.875588][T20464] inet6_hash_connect+0xaf/0xc0 [ 1774.875610][T20464] tcp_v6_connect+0x983/0xc30 [ 1774.875650][T20464] __inet_stream_connect+0x169/0x7d0 [ 1774.875803][T20464] ? tcp_sendmsg_fastopen+0x172/0x520 [ 1774.875880][T20464] ? should_failslab+0x8c/0xb0 [ 1774.875916][T20464] ? __kmalloc_cache_noprof+0x249/0x4a0 [ 1774.875956][T20464] tcp_sendmsg_fastopen+0x43a/0x520 [ 1774.876063][T20464] tcp_sendmsg_locked+0x26e1/0x2c00 [ 1774.876093][T20464] ? mntput_no_expire+0x6f/0x440 [ 1774.876184][T20464] ? __rcu_read_unlock+0x4f/0x70 [ 1774.876216][T20464] ? avc_has_perm_noaudit+0x1b1/0x200 [ 1774.876331][T20464] ? avc_has_perm+0xf7/0x180 [ 1774.876428][T20464] ? _raw_spin_unlock_bh+0x36/0x40 [ 1774.876467][T20464] ? __pfx_tcp_sendmsg+0x10/0x10 [ 1774.876496][T20464] tcp_sendmsg+0x2f/0x50 [ 1774.876523][T20464] inet6_sendmsg+0x76/0xd0 [ 1774.876665][T20464] __sock_sendmsg+0x8b/0x180 [ 1774.876689][T20464] __sys_sendto+0x268/0x330 [ 1774.876750][T20464] __x64_sys_sendto+0x76/0x90 [ 1774.876787][T20464] x64_sys_call+0x2d14/0x3000 [ 1774.876864][T20464] do_syscall_64+0xd2/0x200 [ 1774.876924][T20464] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1774.876996][T20464] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1774.877028][T20464] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1774.877059][T20464] RIP: 0033:0x7f5d74e1efc9 [ 1774.877105][T20464] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1774.877131][T20464] RSP: 002b:00007f5d7387f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1774.877158][T20464] RAX: ffffffffffffffda RBX: 00007f5d75075fa0 RCX: 00007f5d74e1efc9 [ 1774.877185][T20464] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 1774.877199][T20464] RBP: 00007f5d7387f090 R08: 0000200000b63fe4 R09: 000000000000001c [ 1774.877216][T20464] R10: 0000000020000845 R11: 0000000000000246 R12: 0000000000000001 [ 1774.877233][T20464] R13: 00007f5d75076038 R14: 00007f5d75075fa0 R15: 00007ffef1dfff28 [ 1774.877313][T20464] [ 1775.164583][T20457] syzkaller0: entered promiscuous mode [ 1775.170188][T20457] syzkaller0: entered allmulticast mode [ 1775.263575][T20467] dummy0: entered allmulticast mode [ 1775.269641][T20465] dummy0: left allmulticast mode [ 1775.329510][T20482] lo speed is unknown, defaulting to 1000 [ 1775.336291][T20482] lo speed is unknown, defaulting to 1000 [ 1775.381842][T20486] binfmt_misc: register: failed to install interpreter file ./file0 [ 1776.275785][T20513] loop2: detected capacity change from 0 to 1024 [ 1776.319335][T20513] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1776.465256][T20520] syzkaller0: entered promiscuous mode [ 1776.470942][T20520] syzkaller0: entered allmulticast mode [ 1776.740933][T20543] __nla_validate_parse: 4 callbacks suppressed [ 1776.740954][T20543] netlink: 24 bytes leftover after parsing attributes in process `syz.9.29114'. [ 1777.097487][T20553] syzkaller0: entered promiscuous mode [ 1777.103048][T20553] syzkaller0: entered allmulticast mode [ 1777.141709][T18695] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1777.325769][T20565] loop2: detected capacity change from 0 to 8192 [ 1777.370275][T20563] syzkaller0: entered promiscuous mode [ 1777.375832][T20563] syzkaller0: entered allmulticast mode [ 1777.439825][T20567] SELinux: failed to load policy [ 1777.470827][T20574] loop2: detected capacity change from 0 to 2048 [ 1777.506399][T20574] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1777.673988][T20588] netlink: 2 bytes leftover after parsing attributes in process `syz.9.29130'. [ 1777.700160][T18695] EXT4-fs error (device loop2): ext4_validate_block_bitmap:441: comm syz-executor: bg 0: block 234: padding at end of block bitmap is not set [ 1777.731008][T18695] EXT4-fs error (device loop2) in ext4_mb_clear_bb:6667: Corrupt filesystem [ 1777.740418][T20595] FAULT_INJECTION: forcing a failure. [ 1777.740418][T20595] name failslab, interval 1, probability 0, space 0, times 0 [ 1777.753163][T20595] CPU: 1 UID: 0 PID: 20595 Comm: syz.9.29130 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1777.753202][T20595] Tainted: [W]=WARN [ 1777.753210][T20595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1777.753228][T20595] Call Trace: [ 1777.753236][T20595] [ 1777.753248][T20595] __dump_stack+0x1d/0x30 [ 1777.753346][T20595] dump_stack_lvl+0xe8/0x140 [ 1777.753374][T20595] dump_stack+0x15/0x1b [ 1777.753398][T20595] should_fail_ex+0x265/0x280 [ 1777.753511][T20595] should_failslab+0x8c/0xb0 [ 1777.753544][T20595] kmem_cache_alloc_noprof+0x50/0x480 [ 1777.753581][T20595] ? skb_clone+0x151/0x1f0 [ 1777.753629][T20595] skb_clone+0x151/0x1f0 [ 1777.753724][T20595] __netlink_deliver_tap+0x2c9/0x500 [ 1777.753768][T20595] netlink_unicast+0x66b/0x690 [ 1777.753804][T20595] netlink_sendmsg+0x58b/0x6b0 [ 1777.753889][T20595] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1777.753970][T20595] __sock_sendmsg+0x145/0x180 [ 1777.753993][T20595] ____sys_sendmsg+0x31e/0x4e0 [ 1777.754031][T20595] ___sys_sendmsg+0x17b/0x1d0 [ 1777.754075][T20595] __x64_sys_sendmsg+0xd4/0x160 [ 1777.754174][T20595] x64_sys_call+0x191e/0x3000 [ 1777.754203][T20595] do_syscall_64+0xd2/0x200 [ 1777.754236][T20595] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1777.754297][T20595] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1777.754327][T20595] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1777.754349][T20595] RIP: 0033:0x7f79bc70efc9 [ 1777.754365][T20595] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1777.754421][T20595] RSP: 002b:00007f79bb14e038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1777.754446][T20595] RAX: ffffffffffffffda RBX: 00007f79bc966090 RCX: 00007f79bc70efc9 [ 1777.754460][T20595] RDX: 0000000000000000 RSI: 0000200000000300 RDI: 000000000000000d [ 1777.754517][T20595] RBP: 00007f79bb14e090 R08: 0000000000000000 R09: 0000000000000000 [ 1777.754581][T20595] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1777.754597][T20595] R13: 00007f79bc966128 R14: 00007f79bc966090 R15: 00007ffcf49f93f8 [ 1777.754625][T20595] [ 1777.754653][T20595] netlink: 8 bytes leftover after parsing attributes in process `syz.9.29130'. [ 1777.977847][T18695] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1777.979519][ T29] kauditd_printk_skb: 162 callbacks suppressed [ 1777.979541][ T29] audit: type=1400 audit(1850.393:311831): avc: denied { unlink } for pid=18695 comm="syz-executor" name="bus" dev="loop2" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 1778.043421][T20588] bridge0: port 2(bridge_slave_1) entered disabled state [ 1778.050879][T20588] bridge0: port 1(bridge_slave_0) entered disabled state [ 1778.223550][T20588] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1778.243794][ T29] audit: type=1400 audit(1850.677:311832): avc: denied { mount } for pid=20603 comm="syz.2.29136" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1778.254641][T20588] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1778.413637][T20588] geneve0: left allmulticast mode [ 1778.428987][T11953] netdevsim netdevsim9 eth0: unset [1, 0] type 2 family 0 port 20000 - 0 [ 1778.437937][T11953] netdevsim netdevsim9 eth0: unset [1, 1] type 2 family 0 port 6081 - 0 [ 1778.504212][T11953] netdevsim netdevsim9 eth1: unset [1, 0] type 2 family 0 port 20000 - 0 [ 1778.513509][T11953] netdevsim netdevsim9 eth1: unset [1, 1] type 2 family 0 port 6081 - 0 [ 1778.573279][T11953] netdevsim netdevsim9 eth2: unset [1, 0] type 2 family 0 port 20000 - 0 [ 1778.581935][T11953] netdevsim netdevsim9 eth2: unset [1, 1] type 2 family 0 port 6081 - 0 [ 1778.624213][T11953] netdevsim netdevsim9 eth3: unset [1, 0] type 2 family 0 port 20000 - 0 [ 1778.633535][T11953] netdevsim netdevsim9 eth3: unset [1, 1] type 2 family 0 port 6081 - 0 [ 1778.773655][ T29] audit: type=1400 audit(1851.233:311833): avc: denied { bind } for pid=20622 comm="syz.2.29143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 1778.816175][T20623] netlink: 36 bytes leftover after parsing attributes in process `syz.2.29143'. [ 1778.862672][T20623] netlink: 36 bytes leftover after parsing attributes in process `syz.2.29143'. [ 1779.285063][T20637] usb usb1: usbfs: process 20637 (syz.2.29145) did not claim interface 4 before use [ 1779.537257][ T29] audit: type=1326 audit(1852.031:311834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20664 comm="syz.9.29158" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f79bc70efc9 code=0x7ffc0000 [ 1779.611269][T20675] netlink: 4 bytes leftover after parsing attributes in process `syz.2.29160'. [ 1779.623040][ T29] audit: type=1326 audit(1852.063:311835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20664 comm="syz.9.29158" exe="/root/syz-executor" sig=0 arch=c000003e syscall=280 compat=0 ip=0x7f79bc70efc9 code=0x7ffc0000 [ 1779.646437][ T29] audit: type=1326 audit(1852.063:311836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20664 comm="syz.9.29158" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f79bc70efc9 code=0x7ffc0000 [ 1779.670000][ T29] audit: type=1326 audit(1852.063:311837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20664 comm="syz.9.29158" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f79bc70efc9 code=0x7ffc0000 [ 1779.693639][ T29] audit: type=1326 audit(1852.063:311838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20664 comm="syz.9.29158" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f79bc70efc9 code=0x7ffc0000 [ 1779.717746][ T29] audit: type=1326 audit(1852.063:311839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20664 comm="syz.9.29158" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f79bc70efc9 code=0x7ffc0000 [ 1779.741615][ T29] audit: type=1326 audit(1852.063:311840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20664 comm="syz.9.29158" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f79bc70efc9 code=0x7ffc0000 [ 1779.960211][T20690] netlink: 40 bytes leftover after parsing attributes in process `syz.7.29164'. [ 1780.027036][T20690] netlink: 68 bytes leftover after parsing attributes in process `syz.7.29164'. [ 1780.571902][T20725] lo speed is unknown, defaulting to 1000 [ 1780.578754][T20725] lo speed is unknown, defaulting to 1000 [ 1780.651929][T20729] usb usb1: usbfs: process 20729 (syz.7.29174) did not claim interface 4 before use [ 1780.983042][T20739] FAULT_INJECTION: forcing a failure. [ 1780.983042][T20739] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1780.997009][T20739] CPU: 0 UID: 0 PID: 20739 Comm: syz.2.29180 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1780.997123][T20739] Tainted: [W]=WARN [ 1780.997133][T20739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1780.997151][T20739] Call Trace: [ 1780.997200][T20739] [ 1780.997211][T20739] __dump_stack+0x1d/0x30 [ 1780.997236][T20739] dump_stack_lvl+0xe8/0x140 [ 1780.997262][T20739] dump_stack+0x15/0x1b [ 1780.997286][T20739] should_fail_ex+0x265/0x280 [ 1780.997333][T20739] should_fail+0xb/0x20 [ 1780.997434][T20739] should_fail_usercopy+0x1a/0x20 [ 1780.997462][T20739] strncpy_from_user+0x25/0x230 [ 1780.997499][T20739] ? bpf_bprintf_cleanup+0x50/0x80 [ 1780.997547][T20739] ? bpf_trace_printk+0xcf/0x1c0 [ 1780.997580][T20739] strncpy_from_user_nofault+0x68/0xf0 [ 1780.997629][T20739] bpf_probe_read_user_str+0x2a/0x70 [ 1780.997660][T20739] bpf_prog_5fa127c71eca57b3+0x3e/0x44 [ 1780.997698][T20739] bpf_trace_run2+0x107/0x1c0 [ 1780.997796][T20739] ? prepend_path+0x42f/0x4c0 [ 1780.997893][T20739] ? audit_log_d_path+0xf4/0x150 [ 1780.997920][T20739] ? audit_log_d_path+0xf4/0x150 [ 1780.997946][T20739] __traceiter_kfree+0x2e/0x50 [ 1780.998035][T20739] ? audit_log_d_path+0xf4/0x150 [ 1780.998061][T20739] kfree+0x351/0x400 [ 1780.998093][T20739] ? audit_log_untrustedstring+0xb6/0xd0 [ 1780.998123][T20739] audit_log_d_path+0xf4/0x150 [ 1780.998226][T20739] audit_log_d_path_exe+0x42/0x70 [ 1780.998250][T20739] audit_log_task+0x1e9/0x250 [ 1780.998296][T20739] audit_seccomp+0x61/0x100 [ 1780.998361][T20739] ? __seccomp_filter+0x82d/0x1250 [ 1780.998397][T20739] __seccomp_filter+0x83e/0x1250 [ 1780.998435][T20739] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1780.998477][T20739] ? vfs_write+0x7e8/0x960 [ 1780.998577][T20739] __secure_computing+0x82/0x150 [ 1780.998611][T20739] syscall_trace_enter+0xcf/0x1e0 [ 1780.998667][T20739] do_syscall_64+0xac/0x200 [ 1780.998700][T20739] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1780.998738][T20739] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1780.998803][T20739] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1780.998833][T20739] RIP: 0033:0x7fade3f2efc9 [ 1780.998854][T20739] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1780.998880][T20739] RSP: 002b:00007fade298f038 EFLAGS: 00000246 ORIG_RAX: 000000000000000d [ 1780.998987][T20739] RAX: ffffffffffffffda RBX: 00007fade4185fa0 RCX: 00007fade3f2efc9 [ 1780.999006][T20739] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000034 [ 1780.999024][T20739] RBP: 00007fade298f090 R08: 0000200000000600 R09: 0000000000000000 [ 1780.999040][T20739] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000000001 [ 1780.999057][T20739] R13: 00007fade4186038 R14: 00007fade4185fa0 R15: 00007fff4671b1b8 [ 1780.999084][T20739] [ 1781.399343][T20745] syzkaller0: entered promiscuous mode [ 1781.405823][T20745] syzkaller0: entered allmulticast mode [ 1781.421320][T20747] netlink: 20 bytes leftover after parsing attributes in process `syz.7.29184'. [ 1781.451729][T20747] netlink: 68 bytes leftover after parsing attributes in process `syz.7.29184'. [ 1781.465512][T20745] tipc: Enabled bearer , priority 0 [ 1781.474399][T20744] tipc: Resetting bearer [ 1781.514905][T20744] tipc: Disabling bearer [ 1781.530706][T20752] netlink: 96 bytes leftover after parsing attributes in process `syz.2.29186'. [ 1781.654710][T20770] FAULT_INJECTION: forcing a failure. [ 1781.654710][T20770] name failslab, interval 1, probability 0, space 0, times 0 [ 1781.668161][T20770] CPU: 0 UID: 0 PID: 20770 Comm: syz.2.29195 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1781.668270][T20770] Tainted: [W]=WARN [ 1781.668279][T20770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1781.668295][T20770] Call Trace: [ 1781.668302][T20770] [ 1781.668310][T20770] __dump_stack+0x1d/0x30 [ 1781.668332][T20770] dump_stack_lvl+0xe8/0x140 [ 1781.668411][T20770] dump_stack+0x15/0x1b [ 1781.668430][T20770] should_fail_ex+0x265/0x280 [ 1781.668477][T20770] ? genl_start+0x117/0x390 [ 1781.668510][T20770] should_failslab+0x8c/0xb0 [ 1781.668605][T20770] __kmalloc_cache_noprof+0x4c/0x4a0 [ 1781.668716][T20770] genl_start+0x117/0x390 [ 1781.668754][T20770] __netlink_dump_start+0x334/0x520 [ 1781.668793][T20770] genl_family_rcv_msg_dumpit+0x115/0x180 [ 1781.668815][T20770] ? __pfx_genl_start+0x10/0x10 [ 1781.668870][T20770] ? __pfx_genl_dumpit+0x10/0x10 [ 1781.668896][T20770] ? __pfx_genl_done+0x10/0x10 [ 1781.668927][T20770] genl_rcv_msg+0x3f0/0x460 [ 1781.669012][T20770] ? __pfx_ieee802154_dump_phy+0x10/0x10 [ 1781.669087][T20770] netlink_rcv_skb+0x123/0x220 [ 1781.669118][T20770] ? __pfx_genl_rcv_msg+0x10/0x10 [ 1781.669144][T20770] genl_rcv+0x28/0x40 [ 1781.669160][T20770] netlink_unicast+0x5c0/0x690 [ 1781.669268][T20770] netlink_sendmsg+0x58b/0x6b0 [ 1781.669302][T20770] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1781.669412][T20770] __sock_sendmsg+0x145/0x180 [ 1781.669434][T20770] ____sys_sendmsg+0x31e/0x4e0 [ 1781.669467][T20770] ___sys_sendmsg+0x17b/0x1d0 [ 1781.669594][T20770] __x64_sys_sendmsg+0xd4/0x160 [ 1781.669711][T20770] x64_sys_call+0x191e/0x3000 [ 1781.669735][T20770] do_syscall_64+0xd2/0x200 [ 1781.669767][T20770] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1781.669826][T20770] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1781.669850][T20770] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1781.669914][T20770] RIP: 0033:0x7fade3f2efc9 [ 1781.669934][T20770] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1781.669966][T20770] RSP: 002b:00007fade298f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1781.669985][T20770] RAX: ffffffffffffffda RBX: 00007fade4185fa0 RCX: 00007fade3f2efc9 [ 1781.670020][T20770] RDX: 0000000020000004 RSI: 00002000000004c0 RDI: 0000000000000004 [ 1781.670037][T20770] RBP: 00007fade298f090 R08: 0000000000000000 R09: 0000000000000000 [ 1781.670054][T20770] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1781.670085][T20770] R13: 00007fade4186038 R14: 00007fade4185fa0 R15: 00007fff4671b1b8 [ 1781.670111][T20770] [ 1782.032310][T20772] usb usb1: usbfs: process 20772 (syz.9.29194) did not claim interface 4 before use [ 1782.070313][T20782] loop2: detected capacity change from 0 to 128 [ 1782.081725][T20782] EXT4-fs (loop2): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 1782.154590][T20788] SELinux: failed to load policy [ 1782.233794][T20794] SELinux: failed to load policy [ 1782.257103][T18695] EXT4-fs (loop2): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 1782.300505][T20793] syzkaller1: entered promiscuous mode [ 1782.306066][T20793] syzkaller1: entered allmulticast mode [ 1782.320277][T20799] loop2: detected capacity change from 0 to 512 [ 1782.347407][T20799] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1782.375781][T20803] netlink: 'syz.7.29206': attribute type 10 has an invalid length. [ 1782.384446][T20803] ipvlan0: entered allmulticast mode [ 1782.389827][T20803] veth0_vlan: entered allmulticast mode [ 1782.397376][T20803] team0: Device ipvlan0 failed to register rx_handler [ 1782.450210][T20805] netlink: 'syz.7.29207': attribute type 2 has an invalid length. [ 1782.463352][T18695] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1782.553852][T20818] IPv6: NLM_F_CREATE should be specified when creating new route [ 1782.567260][T20819] netlink: 20 bytes leftover after parsing attributes in process `syz.2.29212'. [ 1782.598277][T20822] SELinux: failed to load policy [ 1782.617107][T20819] loop2: detected capacity change from 0 to 1024 [ 1782.638166][T20819] netlink: 68 bytes leftover after parsing attributes in process `syz.2.29212'. [ 1782.676871][T20829] tipc: Enabling of bearer rejected, failed to enable media [ 1782.751756][T20829] syzkaller0: entered promiscuous mode [ 1782.757310][T20829] syzkaller0: entered allmulticast mode [ 1782.836517][ T29] kauditd_printk_skb: 274 callbacks suppressed [ 1782.836534][ T29] audit: type=1400 audit(1855.495:312115): avc: denied { create } for pid=20834 comm="syz.9.29218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 1782.874239][T20835] xt_socket: unknown flags 0x50 [ 1782.979986][T20842] FAULT_INJECTION: forcing a failure. [ 1782.979986][T20842] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1782.993395][T20842] CPU: 1 UID: 0 PID: 20842 Comm: syz.2.29221 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1782.993437][T20842] Tainted: [W]=WARN [ 1782.993447][T20842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1782.993462][T20842] Call Trace: [ 1782.993469][T20842] [ 1782.993480][T20842] __dump_stack+0x1d/0x30 [ 1782.993513][T20842] dump_stack_lvl+0xe8/0x140 [ 1782.993540][T20842] dump_stack+0x15/0x1b [ 1782.993563][T20842] should_fail_ex+0x265/0x280 [ 1782.993666][T20842] should_fail_alloc_page+0xf2/0x100 [ 1782.993706][T20842] __alloc_frozen_pages_noprof+0xff/0x360 [ 1782.993816][T20842] alloc_pages_mpol+0xb3/0x260 [ 1782.993841][T20842] ? sysvec_apic_timer_interrupt+0x44/0x80 [ 1782.993883][T20842] alloc_pages_noprof+0x90/0x130 [ 1782.993903][T20842] __pud_alloc+0x47/0x470 [ 1782.993956][T20842] handle_mm_fault+0x1882/0x2be0 [ 1782.993993][T20842] ? check_vma_flags+0x26e/0x340 [ 1782.994019][T20842] __get_user_pages+0x102a/0x1ed0 [ 1782.994183][T20842] get_user_pages_remote+0x1d5/0x6c0 [ 1782.994215][T20842] ? down_read+0x77/0xe0 [ 1782.994262][T20842] get_arg_page+0x8e/0x1e0 [ 1782.994283][T20842] copy_string_kernel+0x12c/0x1f0 [ 1782.994312][T20842] do_execveat_common+0x5ad/0x750 [ 1782.994354][T20842] ? getname_flags+0x154/0x3b0 [ 1782.994395][T20842] __x64_sys_execveat+0x73/0x90 [ 1782.994554][T20842] x64_sys_call+0x1fec/0x3000 [ 1782.994584][T20842] do_syscall_64+0xd2/0x200 [ 1782.994686][T20842] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1782.994725][T20842] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1782.994782][T20842] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1782.994810][T20842] RIP: 0033:0x7fade3f2efc9 [ 1782.994863][T20842] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1782.994881][T20842] RSP: 002b:00007fade298f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1782.994911][T20842] RAX: ffffffffffffffda RBX: 00007fade4185fa0 RCX: 00007fade3f2efc9 [ 1782.994924][T20842] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 1782.994942][T20842] RBP: 00007fade298f090 R08: 0000000000001000 R09: 0000000000000000 [ 1782.994959][T20842] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1782.994976][T20842] R13: 00007fade4186038 R14: 00007fade4185fa0 R15: 00007fff4671b1b8 [ 1782.995004][T20842] [ 1783.457945][T20855] SELinux: failed to load policy [ 1783.464997][T20856] usb usb1: usbfs: process 20856 (syz.2.29225) did not claim interface 4 before use [ 1783.527734][T20861] tipc: Enabling of bearer rejected, failed to enable media [ 1783.590950][T20861] syzkaller0: entered promiscuous mode [ 1783.596532][T20861] syzkaller0: entered allmulticast mode [ 1783.726494][T20868] 9pnet_fd: Insufficient options for proto=fd [ 1783.738212][ T29] audit: type=1326 audit(1856.440:312116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20869 comm="syz.9.29233" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f79bc70efc9 code=0x7ffc0000 [ 1783.746939][T20868] netlink: 8 bytes leftover after parsing attributes in process `syz.5.29232'. [ 1783.761624][ T29] audit: type=1326 audit(1856.440:312117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20869 comm="syz.9.29233" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f79bc70efc9 code=0x7ffc0000 [ 1783.774718][ T29] audit: type=1326 audit(1856.440:312118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20869 comm="syz.9.29233" exe="/root/syz-executor" sig=0 arch=c000003e syscall=280 compat=0 ip=0x7f79bc70efc9 code=0x7ffc0000 [ 1783.818123][ T29] audit: type=1326 audit(1856.440:312119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20869 comm="syz.9.29233" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f79bc70efc9 code=0x7ffc0000 [ 1783.841731][ T29] audit: type=1326 audit(1856.440:312120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20869 comm="syz.9.29233" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f79bc70efc9 code=0x7ffc0000 [ 1783.905263][ T29] audit: type=1326 audit(1856.503:312121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20869 comm="syz.9.29233" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f79bc70efc9 code=0x7ffc0000 [ 1783.928584][ T29] audit: type=1326 audit(1856.503:312122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20869 comm="syz.9.29233" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f79bc70efc9 code=0x7ffc0000 [ 1783.952128][ T29] audit: type=1326 audit(1856.503:312123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20869 comm="syz.9.29233" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f79bc70efc9 code=0x7ffc0000 [ 1783.975488][ T29] audit: type=1326 audit(1856.577:312124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20869 comm="syz.9.29233" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f79bc70efc9 code=0x7ffc0000 [ 1784.031970][T20881] FAULT_INJECTION: forcing a failure. [ 1784.031970][T20881] name failslab, interval 1, probability 0, space 0, times 0 [ 1784.044787][T20881] CPU: 0 UID: 0 PID: 20881 Comm: syz.6.29237 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1784.044832][T20881] Tainted: [W]=WARN [ 1784.044841][T20881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1784.044929][T20881] Call Trace: [ 1784.044936][T20881] [ 1784.044947][T20881] __dump_stack+0x1d/0x30 [ 1784.044969][T20881] dump_stack_lvl+0xe8/0x140 [ 1784.045136][T20881] dump_stack+0x15/0x1b [ 1784.045152][T20881] should_fail_ex+0x265/0x280 [ 1784.045197][T20881] should_failslab+0x8c/0xb0 [ 1784.045239][T20881] kmem_cache_alloc_noprof+0x50/0x480 [ 1784.045292][T20881] ? skb_clone+0x151/0x1f0 [ 1784.045327][T20881] skb_clone+0x151/0x1f0 [ 1784.045412][T20881] __netlink_deliver_tap+0x2c9/0x500 [ 1784.045453][T20881] netlink_unicast+0x66b/0x690 [ 1784.045487][T20881] netlink_sendmsg+0x58b/0x6b0 [ 1784.045718][T20881] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1784.045759][T20881] __sock_sendmsg+0x145/0x180 [ 1784.045784][T20881] ____sys_sendmsg+0x31e/0x4e0 [ 1784.045817][T20881] ___sys_sendmsg+0x17b/0x1d0 [ 1784.046005][T20881] __x64_sys_sendmsg+0xd4/0x160 [ 1784.046050][T20881] x64_sys_call+0x191e/0x3000 [ 1784.046079][T20881] do_syscall_64+0xd2/0x200 [ 1784.046112][T20881] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1784.046193][T20881] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1784.046221][T20881] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1784.046249][T20881] RIP: 0033:0x7f5d74e1efc9 [ 1784.046341][T20881] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1784.046366][T20881] RSP: 002b:00007f5d7387f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1784.046390][T20881] RAX: ffffffffffffffda RBX: 00007f5d75075fa0 RCX: 00007f5d74e1efc9 [ 1784.046458][T20881] RDX: 0000000000044000 RSI: 0000200000000540 RDI: 0000000000000003 [ 1784.046474][T20881] RBP: 00007f5d7387f090 R08: 0000000000000000 R09: 0000000000000000 [ 1784.046490][T20881] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1784.046507][T20881] R13: 00007f5d75076038 R14: 00007f5d75075fa0 R15: 00007ffef1dfff28 [ 1784.046586][T20881] [ 1784.334274][T20890] lo speed is unknown, defaulting to 1000 [ 1784.364852][T20890] lo speed is unknown, defaulting to 1000 [ 1784.451751][T20899] tipc: Enabling of bearer rejected, failed to enable media [ 1784.521275][T20899] syzkaller0: entered promiscuous mode [ 1784.521340][T20899] syzkaller0: entered allmulticast mode [ 1784.598470][T20905] FAULT_INJECTION: forcing a failure. [ 1784.598470][T20905] name failslab, interval 1, probability 0, space 0, times 0 [ 1784.622493][T20905] CPU: 1 UID: 0 PID: 20905 Comm: syz.2.29245 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1784.622554][T20905] Tainted: [W]=WARN [ 1784.622563][T20905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1784.622580][T20905] Call Trace: [ 1784.622588][T20905] [ 1784.622598][T20905] __dump_stack+0x1d/0x30 [ 1784.622626][T20905] dump_stack_lvl+0xe8/0x140 [ 1784.622691][T20905] dump_stack+0x15/0x1b [ 1784.622708][T20905] should_fail_ex+0x265/0x280 [ 1784.622743][T20905] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 1784.622772][T20905] should_failslab+0x8c/0xb0 [ 1784.622880][T20905] kmem_cache_alloc_lru_noprof+0x55/0x490 [ 1784.622909][T20905] ? shmem_alloc_inode+0x34/0x50 [ 1784.623026][T20905] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 1784.623129][T20905] shmem_alloc_inode+0x34/0x50 [ 1784.623148][T20905] alloc_inode+0x40/0x170 [ 1784.623223][T20905] new_inode+0x1d/0xe0 [ 1784.623257][T20905] shmem_get_inode+0x244/0x750 [ 1784.623286][T20905] __shmem_file_setup+0x113/0x210 [ 1784.623329][T20905] shmem_file_setup+0x3b/0x50 [ 1784.623412][T20905] __se_sys_memfd_create+0x2c3/0x590 [ 1784.623442][T20905] __x64_sys_memfd_create+0x31/0x40 [ 1784.623535][T20905] x64_sys_call+0x2ac2/0x3000 [ 1784.623561][T20905] do_syscall_64+0xd2/0x200 [ 1784.623589][T20905] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1784.623620][T20905] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1784.623685][T20905] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1784.623709][T20905] RIP: 0033:0x7fade3f2efc9 [ 1784.623727][T20905] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1784.623778][T20905] RSP: 002b:00007fade298ee18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 1784.623801][T20905] RAX: ffffffffffffffda RBX: 0000000000000500 RCX: 00007fade3f2efc9 [ 1784.623816][T20905] RDX: 00007fade298eef0 RSI: 0000000000000000 RDI: 00007fade3fb2960 [ 1784.623830][T20905] RBP: 0000200000000500 R08: 00007fade298ebb7 R09: 00007fade298ee40 [ 1784.623848][T20905] R10: 000000000000000a R11: 0000000000000202 R12: 00002000000000c0 [ 1784.623903][T20905] R13: 00007fade298eef0 R14: 00007fade298eeb0 R15: 0000200000000100 [ 1784.623925][T20905] [ 1785.224877][T20925] loop2: detected capacity change from 0 to 512 [ 1785.308776][T20925] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 1785.380481][T20945] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20945 comm=syz.7.29254 [ 1785.601642][T20956] netlink: 'syz.7.29254': attribute type 39 has an invalid length. [ 1785.899930][T18695] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 1785.942691][T20969] tipc: Enabling of bearer rejected, failed to enable media [ 1785.995821][T20969] syzkaller0: entered promiscuous mode [ 1786.001394][T20969] syzkaller0: entered allmulticast mode [ 1786.430185][T21004] FAULT_INJECTION: forcing a failure. [ 1786.430185][T21004] name failslab, interval 1, probability 0, space 0, times 0 [ 1786.443906][T21004] CPU: 0 UID: 0 PID: 21004 Comm: syz.6.29273 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1786.444020][T21004] Tainted: [W]=WARN [ 1786.444030][T21004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1786.444048][T21004] Call Trace: [ 1786.444057][T21004] [ 1786.444065][T21004] __dump_stack+0x1d/0x30 [ 1786.444088][T21004] dump_stack_lvl+0xe8/0x140 [ 1786.444165][T21004] dump_stack+0x15/0x1b [ 1786.444223][T21004] should_fail_ex+0x265/0x280 [ 1786.444263][T21004] ? sctp_add_bind_addr+0x71/0x1e0 [ 1786.444288][T21004] should_failslab+0x8c/0xb0 [ 1786.444354][T21004] __kmalloc_cache_noprof+0x4c/0x4a0 [ 1786.444410][T21004] sctp_add_bind_addr+0x71/0x1e0 [ 1786.444456][T21004] sctp_copy_local_addr_list+0x199/0x220 [ 1786.444493][T21004] sctp_copy_one_addr+0x7f/0x280 [ 1786.444522][T21004] sctp_bind_addr_copy+0x79/0x290 [ 1786.444689][T21004] sctp_assoc_set_bind_addr_from_ep+0xce/0xe0 [ 1786.444737][T21004] sctp_connect_new_asoc+0x1c3/0x3a0 [ 1786.444782][T21004] sctp_sendmsg+0xf10/0x18d0 [ 1786.444826][T21004] ? selinux_socket_sendmsg+0x141/0x1b0 [ 1786.444861][T21004] ? __pfx_sctp_sendmsg+0x10/0x10 [ 1786.444910][T21004] inet_sendmsg+0xc5/0xd0 [ 1786.445071][T21004] __sock_sendmsg+0x102/0x180 [ 1786.445100][T21004] ____sys_sendmsg+0x345/0x4e0 [ 1786.445139][T21004] ___sys_sendmsg+0x17b/0x1d0 [ 1786.445265][T21004] __sys_sendmmsg+0x178/0x300 [ 1786.445322][T21004] __x64_sys_sendmmsg+0x57/0x70 [ 1786.445415][T21004] x64_sys_call+0x1c4a/0x3000 [ 1786.445444][T21004] do_syscall_64+0xd2/0x200 [ 1786.445478][T21004] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1786.445516][T21004] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1786.445546][T21004] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1786.445612][T21004] RIP: 0033:0x7f5d74e1efc9 [ 1786.445630][T21004] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1786.445655][T21004] RSP: 002b:00007f5d7387f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1786.445716][T21004] RAX: ffffffffffffffda RBX: 00007f5d75075fa0 RCX: 00007f5d74e1efc9 [ 1786.445732][T21004] RDX: 0000000000000002 RSI: 0000200000000680 RDI: 0000000000000006 [ 1786.445772][T21004] RBP: 00007f5d7387f090 R08: 0000000000000000 R09: 0000000000000000 [ 1786.445788][T21004] R10: 0000000004000000 R11: 0000000000000246 R12: 0000000000000001 [ 1786.445800][T21004] R13: 00007f5d75076038 R14: 00007f5d75075fa0 R15: 00007ffef1dfff28 [ 1786.445820][T21004] [ 1786.463625][T21008] tipc: Enabling of bearer rejected, failed to enable media [ 1786.730499][T21010] syzkaller0: entered promiscuous mode [ 1786.736295][T21010] syzkaller0: entered allmulticast mode [ 1786.897953][T21032] FAULT_INJECTION: forcing a failure. [ 1786.897953][T21032] name failslab, interval 1, probability 0, space 0, times 0 [ 1786.910796][T21032] CPU: 1 UID: 0 PID: 21032 Comm: syz.6.29283 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1786.910839][T21032] Tainted: [W]=WARN [ 1786.910848][T21032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1786.910862][T21032] Call Trace: [ 1786.910869][T21032] [ 1786.910877][T21032] __dump_stack+0x1d/0x30 [ 1786.910965][T21032] dump_stack_lvl+0xe8/0x140 [ 1786.910991][T21032] dump_stack+0x15/0x1b [ 1786.911018][T21032] should_fail_ex+0x265/0x280 [ 1786.911119][T21032] should_failslab+0x8c/0xb0 [ 1786.911156][T21032] __kmalloc_node_track_caller_noprof+0xa5/0x580 [ 1786.911225][T21032] ? sidtab_sid2str_get+0xa0/0x130 [ 1786.911257][T21032] kmemdup_noprof+0x2b/0x70 [ 1786.911346][T21032] sidtab_sid2str_get+0xa0/0x130 [ 1786.911385][T21032] security_sid_to_context_core+0x1eb/0x2e0 [ 1786.911468][T21032] security_sid_to_context+0x27/0x40 [ 1786.911503][T21032] selinux_lsmprop_to_secctx+0x67/0xf0 [ 1786.911534][T21032] security_lsmprop_to_secctx+0x1a3/0x1c0 [ 1786.911612][T21032] audit_log_subj_ctx+0xa4/0x3e0 [ 1786.911632][T21032] ? skb_put+0xa9/0xf0 [ 1786.911659][T21032] audit_log_task_context+0x48/0x70 [ 1786.911725][T21032] audit_log_task+0xf4/0x250 [ 1786.911780][T21032] ? kstrtouint+0x76/0xc0 [ 1786.911867][T21032] audit_seccomp+0x61/0x100 [ 1786.911906][T21032] ? __seccomp_filter+0x82d/0x1250 [ 1786.911943][T21032] __seccomp_filter+0x83e/0x1250 [ 1786.911974][T21032] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1786.912035][T21032] ? vfs_write+0x7e8/0x960 [ 1786.912150][T21032] __secure_computing+0x82/0x150 [ 1786.912185][T21032] syscall_trace_enter+0xcf/0x1e0 [ 1786.912266][T21032] do_syscall_64+0xac/0x200 [ 1786.912297][T21032] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1786.912327][T21032] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1786.912357][T21032] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1786.912444][T21032] RIP: 0033:0x7f5d74e1efc9 [ 1786.912463][T21032] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1786.912482][T21032] RSP: 002b:00007f5d7387f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ff [ 1786.912502][T21032] RAX: ffffffffffffffda RBX: 00007f5d75075fa0 RCX: 00007f5d74e1efc9 [ 1786.912518][T21032] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffffffffff [ 1786.912531][T21032] RBP: 00007f5d7387f090 R08: 0000000000000000 R09: 0000000000000000 [ 1786.912602][T21032] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1786.912618][T21032] R13: 00007f5d75076038 R14: 00007f5d75075fa0 R15: 00007ffef1dfff28 [ 1786.912637][T21032] [ 1787.176417][T21036] netlink: 256 bytes leftover after parsing attributes in process `syz.9.29285'. [ 1787.305814][T21050] tipc: Enabling of bearer rejected, failed to enable media [ 1787.345825][T21050] syzkaller0: entered promiscuous mode [ 1787.351418][T21050] syzkaller0: entered allmulticast mode [ 1787.438039][T11937] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1787.496157][T11937] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1787.548399][T21061] loop2: detected capacity change from 0 to 512 [ 1787.560600][T11937] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1787.568700][T21061] EXT4-fs: Ignoring removed i_version option [ 1787.583293][T21061] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1787.605039][ T29] kauditd_printk_skb: 622 callbacks suppressed [ 1787.605141][ T29] audit: type=1326 audit(1860.503:312744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21042 comm="syz.6.29287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f5d74e15e67 code=0x7ffc0000 [ 1787.641993][ T29] audit: type=1326 audit(1860.503:312745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21042 comm="syz.6.29287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f5d74dbb099 code=0x7ffc0000 [ 1787.665459][ T29] audit: type=1326 audit(1860.503:312746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21042 comm="syz.6.29287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=19 compat=0 ip=0x7f5d74e1efc9 code=0x7ffc0000 [ 1787.688713][ T29] audit: type=1326 audit(1860.503:312747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21042 comm="syz.6.29287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f5d74e15e67 code=0x7ffc0000 [ 1787.712495][ T29] audit: type=1326 audit(1860.503:312748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21042 comm="syz.6.29287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f5d74dbb099 code=0x7ffc0000 [ 1787.735721][ T29] audit: type=1326 audit(1860.503:312749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21042 comm="syz.6.29287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=19 compat=0 ip=0x7f5d74e1efc9 code=0x7ffc0000 [ 1787.758977][ T29] audit: type=1326 audit(1860.503:312750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21042 comm="syz.6.29287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f5d74e15e67 code=0x7ffc0000 [ 1787.782169][ T29] audit: type=1326 audit(1860.503:312751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21042 comm="syz.6.29287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f5d74dbb099 code=0x7ffc0000 [ 1787.805364][ T29] audit: type=1326 audit(1860.503:312752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21042 comm="syz.6.29287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=19 compat=0 ip=0x7f5d74e1efc9 code=0x7ffc0000 [ 1787.828828][ T29] audit: type=1326 audit(1860.503:312753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21042 comm="syz.6.29287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f5d74e15e67 code=0x7ffc0000 [ 1787.855288][T11937] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1788.123328][T11937] bridge_slave_1: left allmulticast mode [ 1788.129097][T11937] bridge_slave_1: left promiscuous mode [ 1788.134823][T11937] bridge0: port 2(bridge_slave_1) entered disabled state [ 1788.164210][T11937] bridge_slave_0: left allmulticast mode [ 1788.169968][T11937] bridge_slave_0: left promiscuous mode [ 1788.176461][T11937] bridge0: port 1(bridge_slave_0) entered disabled state [ 1788.603469][T11937] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1788.616209][T11937] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1788.728466][T11937] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 1788.743448][T11937] bond0 (unregistering): Released all slaves [ 1788.774941][T21060] lo speed is unknown, defaulting to 1000 [ 1788.782601][T21060] lo speed is unknown, defaulting to 1000 [ 1788.892017][T11937] tipc: Left network mode [ 1789.001113][T21100] netlink: 12 bytes leftover after parsing attributes in process `syz.6.29306'. [ 1789.106352][T11937] hsr_slave_0: left promiscuous mode [ 1789.125205][T11937] hsr_slave_1: left promiscuous mode [ 1789.142389][T11937] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1789.150190][T11937] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1789.197807][T11937] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1789.205587][T11937] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1789.236347][T11937] veth1_macvtap: left promiscuous mode [ 1789.242291][T11937] veth0_macvtap: left promiscuous mode [ 1789.247827][T11937] veth1_vlan: left promiscuous mode [ 1789.253223][T11937] veth0_vlan: left promiscuous mode [ 1789.320325][T21117] SELinux: failed to load policy [ 1789.341694][T11937] pimreg (unregistering): left allmulticast mode [ 1789.370019][T18695] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1789.422551][T11937] team0 (unregistering): Port device team_slave_1 removed [ 1789.433879][T11937] team0 (unregistering): Port device team_slave_0 removed [ 1789.494905][T21118] tipc: Enabling of bearer rejected, failed to enable media [ 1789.536949][T21119] syzkaller0: entered promiscuous mode [ 1789.542537][T21119] syzkaller0: entered allmulticast mode [ 1789.704769][T21137] FAULT_INJECTION: forcing a failure. [ 1789.704769][T21137] name failslab, interval 1, probability 0, space 0, times 0 [ 1789.717676][T21137] CPU: 0 UID: 0 PID: 21137 Comm: syz.6.29318 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1789.717839][T21137] Tainted: [W]=WARN [ 1789.717892][T21137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1789.717906][T21137] Call Trace: [ 1789.717913][T21137] [ 1789.717921][T21137] __dump_stack+0x1d/0x30 [ 1789.717944][T21137] dump_stack_lvl+0xe8/0x140 [ 1789.717970][T21137] dump_stack+0x15/0x1b [ 1789.718063][T21137] should_fail_ex+0x265/0x280 [ 1789.718126][T21137] should_failslab+0x8c/0xb0 [ 1789.718155][T21137] __kmalloc_node_track_caller_noprof+0xa5/0x580 [ 1789.718195][T21137] ? ethnl_default_set_doit+0x3a0/0x6c0 [ 1789.718307][T21137] kmemdup_noprof+0x2b/0x70 [ 1789.718339][T21137] ethnl_default_set_doit+0x3a0/0x6c0 [ 1789.718380][T21137] ? genl_family_rcv_msg_attrs_parse+0x184/0x190 [ 1789.718482][T21137] genl_family_rcv_msg_doit+0x143/0x1b0 [ 1789.718577][T21137] genl_rcv_msg+0x422/0x460 [ 1789.718598][T21137] ? __pfx_ethnl_default_set_doit+0x10/0x10 [ 1789.718640][T21137] netlink_rcv_skb+0x123/0x220 [ 1789.718717][T21137] ? __pfx_genl_rcv_msg+0x10/0x10 [ 1789.718762][T21137] genl_rcv+0x28/0x40 [ 1789.718855][T21137] netlink_unicast+0x5c0/0x690 [ 1789.718893][T21137] netlink_sendmsg+0x58b/0x6b0 [ 1789.718930][T21137] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1789.718967][T21137] __sock_sendmsg+0x145/0x180 [ 1789.718992][T21137] ____sys_sendmsg+0x31e/0x4e0 [ 1789.719028][T21137] ___sys_sendmsg+0x17b/0x1d0 [ 1789.719072][T21137] __x64_sys_sendmsg+0xd4/0x160 [ 1789.719177][T21137] x64_sys_call+0x191e/0x3000 [ 1789.719410][T21137] do_syscall_64+0xd2/0x200 [ 1789.719437][T21137] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1789.719592][T21137] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1789.719617][T21137] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1789.719647][T21137] RIP: 0033:0x7f5d74e1efc9 [ 1789.719668][T21137] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1789.719687][T21137] RSP: 002b:00007f5d7387f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1789.719706][T21137] RAX: ffffffffffffffda RBX: 00007f5d75075fa0 RCX: 00007f5d74e1efc9 [ 1789.719727][T21137] RDX: 0000000000000000 RSI: 0000200000000540 RDI: 000000000000000d [ 1789.719740][T21137] RBP: 00007f5d7387f090 R08: 0000000000000000 R09: 0000000000000000 [ 1789.719757][T21137] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1789.719774][T21137] R13: 00007f5d75076038 R14: 00007f5d75075fa0 R15: 00007ffef1dfff28 [ 1789.719801][T21137] [ 1789.968198][T21060] chnl_net:caif_netlink_parms(): no params data found [ 1790.117388][T21140] vlan2: entered allmulticast mode [ 1790.124759][T21135] usb usb1: usbfs: process 21135 (syz.7.29315) did not claim interface 4 before use [ 1790.194711][T21060] bridge0: port 1(bridge_slave_0) entered blocking state [ 1790.201920][T21060] bridge0: port 1(bridge_slave_0) entered disabled state [ 1790.216158][T21060] bridge_slave_0: entered allmulticast mode [ 1790.223044][T21060] bridge_slave_0: entered promiscuous mode [ 1790.230737][T21060] bridge0: port 2(bridge_slave_1) entered blocking state [ 1790.237939][T21060] bridge0: port 2(bridge_slave_1) entered disabled state [ 1790.245382][T21060] bridge_slave_1: entered allmulticast mode [ 1790.252836][T21060] bridge_slave_1: entered promiscuous mode [ 1790.316068][T21060] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1790.336682][T21060] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1790.361621][T21162] loop2: detected capacity change from 0 to 512 [ 1790.402308][T21162] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1790.425614][T21060] team0: Port device team_slave_0 added [ 1790.439358][T21143] lo speed is unknown, defaulting to 1000 [ 1790.448316][T21060] team0: Port device team_slave_1 added [ 1790.464710][T21143] lo speed is unknown, defaulting to 1000 [ 1790.565437][T21060] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1790.572634][T21060] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1790.598653][T21060] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1790.608935][T21162] EXT4-fs (loop2): shut down requested (0) [ 1790.617914][T21060] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1790.625689][T21060] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1790.652359][T21060] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1790.697225][T21162] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop2 ino=16 [ 1790.719251][T21162] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop2 ino=16 [ 1790.745345][T21162] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop2 ino=16 [ 1790.808556][T21060] hsr_slave_0: entered promiscuous mode [ 1790.823825][T21060] hsr_slave_1: entered promiscuous mode [ 1790.829909][T21060] debugfs: 'hsr0' already exists in 'hsr' [ 1790.835681][T21060] Cannot create hsr debugfs directory [ 1790.907275][T18695] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1790.976076][T21155] usb usb1: usbfs: process 21155 (syz.7.29322) did not claim interface 4 before use [ 1791.090085][T21143] chnl_net:caif_netlink_parms(): no params data found [ 1791.157716][T11937] bridge_slave_1: left allmulticast mode [ 1791.163403][T11937] bridge_slave_1: left promiscuous mode [ 1791.169147][T11937] bridge0: port 2(bridge_slave_1) entered disabled state [ 1791.178279][T11937] bridge_slave_0: left allmulticast mode [ 1791.184011][T11937] bridge_slave_0: left promiscuous mode [ 1791.189794][T11937] bridge0: port 1(bridge_slave_0) entered disabled state [ 1791.255241][T11937] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1791.266783][T11937] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1791.276780][T11937] bond0 (unregistering): Released all slaves [ 1791.296863][T21182] tipc: Enabling of bearer rejected, failed to enable media [ 1791.330147][T21183] syzkaller0: entered promiscuous mode [ 1791.335684][T21183] syzkaller0: entered allmulticast mode [ 1791.345155][T11937] tipc: Left network mode [ 1791.508091][T11937] hsr_slave_0: left promiscuous mode [ 1791.516152][T21191] 9pnet_fd: Insufficient options for proto=fd [ 1791.531012][T11937] hsr_slave_1: left promiscuous mode [ 1791.547051][T11937] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1791.565985][T11937] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1791.578401][T11937] pimreg (unregistering): left allmulticast mode [ 1791.637252][T11937] team0 (unregistering): Port device team_slave_1 removed [ 1791.657897][T11937] team0 (unregistering): Port device team_slave_0 removed [ 1791.746464][T21143] bridge0: port 1(bridge_slave_0) entered blocking state [ 1791.753577][T21143] bridge0: port 1(bridge_slave_0) entered disabled state [ 1791.794181][T21143] bridge_slave_0: entered allmulticast mode [ 1791.801051][T21143] bridge_slave_0: entered promiscuous mode [ 1791.824145][T21143] bridge0: port 2(bridge_slave_1) entered blocking state [ 1791.831293][T21143] bridge0: port 2(bridge_slave_1) entered disabled state [ 1791.838580][T21143] bridge_slave_1: entered allmulticast mode [ 1791.845465][T21143] bridge_slave_1: entered promiscuous mode [ 1791.865174][T21204] atomic_op ffff8881723bf128 conn xmit_atomic 0000000000000000 [ 1791.893208][T21143] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1791.929581][T21143] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1791.979260][T21143] team0: Port device team_slave_0 added [ 1791.990405][T21060] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 1792.010090][T21143] team0: Port device team_slave_1 added [ 1792.016417][T21060] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 1792.026950][T21195] lo speed is unknown, defaulting to 1000 [ 1792.036437][T21060] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1792.053947][T21195] lo speed is unknown, defaulting to 1000 [ 1792.083814][T21143] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1792.091452][T21143] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1792.117523][T21143] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1792.131782][T21060] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 1792.163350][T21143] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1792.171105][T21143] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1792.197823][T21143] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1792.259120][T21143] hsr_slave_0: entered promiscuous mode [ 1792.265710][T21143] hsr_slave_1: entered promiscuous mode [ 1792.271628][T21143] debugfs: 'hsr0' already exists in 'hsr' [ 1792.277358][T21143] Cannot create hsr debugfs directory [ 1792.343066][T11937] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1792.429172][T21195] chnl_net:caif_netlink_parms(): no params data found [ 1792.442233][T11937] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1792.468159][T21060] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1792.497271][T11937] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1792.552120][T11937] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1792.565402][T21195] bridge0: port 1(bridge_slave_0) entered blocking state [ 1792.572525][T21195] bridge0: port 1(bridge_slave_0) entered disabled state [ 1792.581868][T21195] bridge_slave_0: entered allmulticast mode [ 1792.588975][T21195] bridge_slave_0: entered promiscuous mode [ 1792.597273][T21060] 8021q: adding VLAN 0 to HW filter on device team0 [ 1792.606409][T21195] bridge0: port 2(bridge_slave_1) entered blocking state [ 1792.613553][T21195] bridge0: port 2(bridge_slave_1) entered disabled state [ 1792.623602][T21195] bridge_slave_1: entered allmulticast mode [ 1792.630452][T21195] bridge_slave_1: entered promiscuous mode [ 1792.659868][ T4390] bridge0: port 1(bridge_slave_0) entered blocking state [ 1792.666991][ T4390] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1792.693879][T21195] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1792.706472][ T4390] bridge0: port 2(bridge_slave_1) entered blocking state [ 1792.713595][ T4390] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1792.724926][T21227] lo speed is unknown, defaulting to 1000 [ 1792.742360][T21195] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1792.772796][T21227] lo speed is unknown, defaulting to 1000 [ 1792.807264][T21195] team0: Port device team_slave_0 added [ 1792.829957][T21195] team0: Port device team_slave_1 added [ 1792.851182][T11937] bridge_slave_1: left allmulticast mode [ 1792.856887][T11937] bridge_slave_1: left promiscuous mode [ 1792.863313][T11937] bridge0: port 2(bridge_slave_1) entered disabled state [ 1792.880136][T11937] bridge_slave_0: left allmulticast mode [ 1792.885976][T11937] bridge_slave_0: left promiscuous mode [ 1792.892595][T11937] bridge0: port 1(bridge_slave_0) entered disabled state [ 1792.980596][T11937] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1792.990903][T11937] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1793.001919][T11937] bond0 (unregistering): Released all slaves [ 1793.066068][T21195] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1793.073224][T21195] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1793.100079][T21195] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1793.112747][T21195] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1793.119869][T21195] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1793.146181][T21195] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1793.207887][T21256] syzkaller0: entered promiscuous mode [ 1793.214281][T21256] syzkaller0: entered allmulticast mode [ 1793.252350][T11937] hsr_slave_0: left promiscuous mode [ 1793.258107][T11937] hsr_slave_1: left promiscuous mode [ 1793.263916][T11937] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1793.271405][T11937] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1793.279172][T11937] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1793.286635][T11937] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1793.299150][T11937] veth1_macvtap: left promiscuous mode [ 1793.304651][T11937] veth0_macvtap: left promiscuous mode [ 1793.310837][T11937] veth1_vlan: left promiscuous mode [ 1793.316087][T11937] veth0_vlan: left promiscuous mode [ 1793.372144][T11937] pimreg (unregistering): left allmulticast mode [ 1793.420474][T11937] team0 (unregistering): Port device team_slave_1 removed [ 1793.431601][T11937] team0 (unregistering): Port device team_slave_0 removed [ 1793.489341][T21143] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1793.541879][T21060] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1793.555002][T21143] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1793.592964][T21195] hsr_slave_0: entered promiscuous mode [ 1793.599398][T21195] hsr_slave_1: entered promiscuous mode [ 1793.606132][T21195] debugfs: 'hsr0' already exists in 'hsr' [ 1793.611904][T21195] Cannot create hsr debugfs directory [ 1793.619531][T21143] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1793.664843][T21143] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1793.672286][T21273] netlink: 'syz.6.29351': attribute type 1 has an invalid length. [ 1793.685886][T21227] chnl_net:caif_netlink_parms(): no params data found [ 1793.708068][T21273] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=201 sclass=netlink_route_socket pid=21273 comm=syz.6.29351 [ 1793.763694][T21273] SELinux: policydb magic number 0x20 does not match expected magic number 0xf97cff8c [ 1793.778957][T21273] SELinux: failed to load policy [ 1793.825333][T21227] bridge0: port 1(bridge_slave_0) entered blocking state [ 1793.832670][T21227] bridge0: port 1(bridge_slave_0) entered disabled state [ 1793.846226][T21227] bridge_slave_0: entered allmulticast mode [ 1793.853104][T21227] bridge_slave_0: entered promiscuous mode [ 1793.860393][T21227] bridge0: port 2(bridge_slave_1) entered blocking state [ 1793.867580][T21227] bridge0: port 2(bridge_slave_1) entered disabled state [ 1793.874951][T21227] bridge_slave_1: entered allmulticast mode [ 1793.881788][T21227] bridge_slave_1: entered promiscuous mode [ 1793.942026][T21060] veth0_vlan: entered promiscuous mode [ 1793.959765][T21227] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1793.971230][T21227] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1793.997188][T21060] veth1_vlan: entered promiscuous mode [ 1794.030110][T21143] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1794.039395][T21227] team0: Port device team_slave_0 added [ 1794.050805][T21227] team0: Port device team_slave_1 added [ 1794.075290][T21143] 8021q: adding VLAN 0 to HW filter on device team0 [ 1794.136623][T21060] veth0_macvtap: entered promiscuous mode [ 1794.152526][T21227] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1794.159633][T21227] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1794.185652][T21227] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1794.201006][T11953] bridge0: port 1(bridge_slave_0) entered blocking state [ 1794.208213][T11953] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1794.222751][T21227] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1794.229927][T21227] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1794.256224][T21227] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1794.270074][T11953] bridge0: port 2(bridge_slave_1) entered blocking state [ 1794.277198][T11953] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1794.286186][T21060] veth1_macvtap: entered promiscuous mode [ 1794.317023][T21195] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 1794.369549][T21195] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1794.382348][T21195] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 1794.442707][T21227] hsr_slave_0: entered promiscuous mode [ 1794.449256][T21227] hsr_slave_1: entered promiscuous mode [ 1794.455724][T21227] debugfs: 'hsr0' already exists in 'hsr' [ 1794.461507][T21227] Cannot create hsr debugfs directory [ 1794.469550][T21195] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 1794.482695][T21060] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1794.513293][T21143] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1794.568847][T21060] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1794.597425][T11977] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1794.637487][T11977] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1794.657812][T11953] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1794.692963][T11953] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1794.726066][T21143] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1794.788349][T21310] usb usb1: usbfs: process 21310 (syz.6.29353) did not claim interface 4 before use [ 1794.815060][T21195] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1794.845707][T21195] 8021q: adding VLAN 0 to HW filter on device team0 [ 1794.859385][T11937] bridge0: port 1(bridge_slave_0) entered blocking state [ 1794.866516][T11937] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1794.896139][T11937] bridge0: port 2(bridge_slave_1) entered blocking state [ 1794.903304][T11937] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1794.970433][T21322] syzkaller0: entered promiscuous mode [ 1794.976181][T21322] syzkaller0: entered allmulticast mode [ 1795.018845][ T29] kauditd_printk_skb: 219 callbacks suppressed [ 1795.018860][ T29] audit: type=1326 audit(1868.282:312973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21327 comm="syz.4.29356" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d25b1efc9 code=0x7ffc0000 [ 1795.048514][ T29] audit: type=1326 audit(1868.282:312974): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21327 comm="syz.4.29356" exe="/root/syz-executor" sig=0 arch=c000003e syscall=317 compat=0 ip=0x7f2d25b1efc9 code=0x7ffc0000 [ 1795.071859][ T29] audit: type=1326 audit(1868.282:312975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21327 comm="syz.4.29356" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f2d25b1efc9 code=0x0 [ 1795.124919][T21143] veth0_vlan: entered promiscuous mode [ 1795.153498][T21227] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1795.169622][T21143] veth1_vlan: entered promiscuous mode [ 1795.181456][T21227] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1795.195204][T21227] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1795.209599][T21227] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1795.234851][T21195] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1795.251358][T21143] veth0_macvtap: entered promiscuous mode [ 1795.265937][T21143] veth1_macvtap: entered promiscuous mode [ 1795.305907][T21143] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1795.333979][T21143] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1795.358054][T11953] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1795.374542][T11953] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1795.393837][T11953] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1795.418787][T11953] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1795.434367][T21227] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1795.476457][T21227] 8021q: adding VLAN 0 to HW filter on device team0 [ 1795.498079][T11970] bridge0: port 1(bridge_slave_0) entered blocking state [ 1795.505295][T11970] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1795.535486][T21195] veth0_vlan: entered promiscuous mode [ 1795.552742][T11953] bridge0: port 2(bridge_slave_1) entered blocking state [ 1795.559916][T11953] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1795.579049][T21195] veth1_vlan: entered promiscuous mode [ 1795.630499][T21195] veth0_macvtap: entered promiscuous mode [ 1795.657136][T21195] veth1_macvtap: entered promiscuous mode [ 1795.695305][T21195] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1795.717711][T21195] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1795.736570][T11953] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1795.763824][T11953] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1795.774729][T11953] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1795.794171][T11953] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1795.816781][T21227] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1795.974624][T21227] veth0_vlan: entered promiscuous mode [ 1795.996860][T21227] veth1_vlan: entered promiscuous mode [ 1796.034591][T21227] veth0_macvtap: entered promiscuous mode [ 1796.059804][T21227] veth1_macvtap: entered promiscuous mode [ 1796.085865][T21227] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1796.101139][ T29] audit: type=1400 audit(1869.426:312976): avc: denied { firmware_load } for pid=21379 comm="syz.6.29363" path="/lib/firmware/regulatory.db" dev="sda1" ino=448 scontext=system_u:system_r:kernel_t tcontext=system_u:object_r:lib_t tclass=system permissive=1 [ 1796.112098][T21227] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1796.143446][T21385] netlink: 4 bytes leftover after parsing attributes in process `syz.6.29363'. [ 1796.155766][T11953] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1796.210007][T11953] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1796.246553][T11953] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1796.258456][T11953] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1796.301539][T21394] FAULT_INJECTION: forcing a failure. [ 1796.301539][T21394] name failslab, interval 1, probability 0, space 0, times 0 [ 1796.305036][T21392] SELinux: failed to load policy [ 1796.315259][T21394] CPU: 0 UID: 0 PID: 21394 Comm: syz.1.29340 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1796.315307][T21394] Tainted: [W]=WARN [ 1796.315376][T21394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1796.315394][T21394] Call Trace: [ 1796.315434][T21394] [ 1796.315447][T21394] __dump_stack+0x1d/0x30 [ 1796.315478][T21394] dump_stack_lvl+0xe8/0x140 [ 1796.315543][T21394] dump_stack+0x15/0x1b [ 1796.315628][T21394] should_fail_ex+0x265/0x280 [ 1796.315742][T21394] ? sctp_add_bind_addr+0x71/0x1e0 [ 1796.315832][T21394] should_failslab+0x8c/0xb0 [ 1796.315874][T21394] __kmalloc_cache_noprof+0x4c/0x4a0 [ 1796.315920][T21394] sctp_add_bind_addr+0x71/0x1e0 [ 1796.316014][T21394] sctp_do_bind+0x427/0x4b0 [ 1796.316061][T21394] sctp_connect_new_asoc+0x153/0x3a0 [ 1796.316110][T21394] __sctp_connect+0x424/0x7a0 [ 1796.316152][T21394] ? selinux_sctp_bind_connect+0x20d/0x250 [ 1796.316276][T21394] sctp_getsockopt_connectx3+0x220/0x300 [ 1796.316332][T21394] sctp_getsockopt+0x910/0xaa0 [ 1796.316376][T21394] sock_common_getsockopt+0x60/0x70 [ 1796.316440][T21394] ? __pfx_sock_common_getsockopt+0x10/0x10 [ 1796.316509][T21394] do_sock_getsockopt+0x200/0x240 [ 1796.316581][T21394] __x64_sys_getsockopt+0x11e/0x1a0 [ 1796.316627][T21394] x64_sys_call+0x2bca/0x3000 [ 1796.316658][T21394] do_syscall_64+0xd2/0x200 [ 1796.316702][T21394] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1796.316743][T21394] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1796.316777][T21394] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1796.316821][T21394] RIP: 0033:0x7f225e91efc9 [ 1796.316843][T21394] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1796.316870][T21394] RSP: 002b:00007f225d387038 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 1796.316898][T21394] RAX: ffffffffffffffda RBX: 00007f225eb75fa0 RCX: 00007f225e91efc9 [ 1796.316917][T21394] RDX: 000000000000006f RSI: 0000000000000084 RDI: 0000000000000005 [ 1796.316934][T21394] RBP: 00007f225d387090 R08: 0000200000000140 R09: 0000000000000000 [ 1796.316953][T21394] R10: 0000200000000200 R11: 0000000000000246 R12: 0000000000000001 [ 1796.317039][T21394] R13: 00007f225eb76038 R14: 00007f225eb75fa0 R15: 00007fffe9ab3558 [ 1796.317068][T21394] [ 1796.398600][T21397] netlink: 60 bytes leftover after parsing attributes in process `syz.1.29369'. [ 1796.460746][ T29] audit: type=1400 audit(1869.794:312977): avc: denied { ioctl } for pid=21396 comm="syz.1.29369" path="socket:[327699]" dev="sockfs" ino=327699 ioctlcmd=0x540d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1796.536530][T21404] xt_connbytes: Forcing CT accounting to be enabled [ 1796.587865][ T29] audit: type=1400 audit(1869.930:312978): avc: denied { setopt } for pid=21405 comm="syz.1.29372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1796.593299][T21402] delete_channel: no stack [ 1796.618478][T21404] Cannot find set identified by id 0 to match [ 1796.628969][ T29] audit: type=1400 audit(1869.972:312979): avc: denied { write } for pid=21399 comm="syz.3.29370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 1796.662347][ T4390] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1796.711385][T21406] syzkaller0: entered promiscuous mode [ 1796.716961][T21406] syzkaller0: entered allmulticast mode [ 1796.733451][ T29] audit: type=1326 audit(1870.088:312980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21412 comm="syz.6.29375" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5d74e1efc9 code=0x7ffc0000 [ 1796.759917][T21406] PF_CAN: dropped non conform CAN FD skbuff: dev type 280, len 65487 [ 1796.769304][ T29] audit: type=1326 audit(1870.088:312981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21412 comm="syz.6.29375" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5d74e1efc9 code=0x7ffc0000 [ 1796.792923][ T29] audit: type=1326 audit(1870.088:312982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21412 comm="syz.6.29375" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5d74e1efc9 code=0x7ffc0000 [ 1796.803653][T21413] FAULT_INJECTION: forcing a failure. [ 1796.803653][T21413] name failslab, interval 1, probability 0, space 0, times 0 [ 1796.829975][T21413] CPU: 0 UID: 0 PID: 21413 Comm: syz.6.29375 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1796.830067][T21413] Tainted: [W]=WARN [ 1796.830073][T21413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1796.830149][T21413] Call Trace: [ 1796.830158][T21413] [ 1796.830168][T21413] __dump_stack+0x1d/0x30 [ 1796.830195][T21413] dump_stack_lvl+0xe8/0x140 [ 1796.830218][T21413] dump_stack+0x15/0x1b [ 1796.830234][T21413] should_fail_ex+0x265/0x280 [ 1796.830273][T21413] should_failslab+0x8c/0xb0 [ 1796.830310][T21413] __kmalloc_node_track_caller_noprof+0xa5/0x580 [ 1796.830393][T21413] ? sidtab_sid2str_get+0xa0/0x130 [ 1796.830580][T21413] kmemdup_noprof+0x2b/0x70 [ 1796.830616][T21413] sidtab_sid2str_get+0xa0/0x130 [ 1796.830664][T21413] security_sid_to_context_core+0x1eb/0x2e0 [ 1796.830705][T21413] security_sid_to_context+0x27/0x40 [ 1796.830796][T21413] selinux_lsmprop_to_secctx+0x67/0xf0 [ 1796.830838][T21413] security_lsmprop_to_secctx+0x1a3/0x1c0 [ 1796.830882][T21413] audit_log_subj_ctx+0xa4/0x3e0 [ 1796.830990][T21413] ? skb_put+0xa9/0xf0 [ 1796.831026][T21413] audit_log_task_context+0x48/0x70 [ 1796.831047][T21413] audit_log_task+0xf4/0x250 [ 1796.831157][T21413] ? kstrtouint+0x76/0xc0 [ 1796.831199][T21413] audit_seccomp+0x61/0x100 [ 1796.831268][T21413] ? __seccomp_filter+0x82d/0x1250 [ 1796.831304][T21413] __seccomp_filter+0x83e/0x1250 [ 1796.831336][T21413] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1796.831414][T21413] ? vfs_write+0x7e8/0x960 [ 1796.831444][T21413] ? __rcu_read_unlock+0x4f/0x70 [ 1796.831523][T21413] ? __fget_files+0x184/0x1c0 [ 1796.831559][T21413] __secure_computing+0x82/0x150 [ 1796.831586][T21413] syscall_trace_enter+0xcf/0x1e0 [ 1796.831671][T21413] do_syscall_64+0xac/0x200 [ 1796.831703][T21413] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1796.831786][T21413] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1796.831894][T21413] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1796.831948][T21413] RIP: 0033:0x7f5d74e1efc9 [ 1796.831965][T21413] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1796.831990][T21413] RSP: 002b:00007f5d7387f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a3 [ 1796.832011][T21413] RAX: ffffffffffffffda RBX: 00007f5d75075fa0 RCX: 00007f5d74e1efc9 [ 1796.832026][T21413] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1796.832056][T21413] RBP: 00007f5d7387f090 R08: 0000000000000000 R09: 0000000000000000 [ 1796.832073][T21413] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1796.832117][T21413] R13: 00007f5d75076038 R14: 00007f5d75075fa0 R15: 00007ffef1dfff28 [ 1796.832152][T21413] [ 1796.876593][ T4390] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1796.902098][T21423] netlink: 60 bytes leftover after parsing attributes in process `syz.6.29378'. [ 1796.902143][T21423] netlink: 60 bytes leftover after parsing attributes in process `syz.6.29378'. [ 1796.963544][T21423] netlink: 60 bytes leftover after parsing attributes in process `syz.6.29378'. [ 1796.963576][T21423] netlink: 60 bytes leftover after parsing attributes in process `syz.6.29378'. [ 1796.990644][ T4390] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1797.019303][T21423] netlink: 60 bytes leftover after parsing attributes in process `syz.6.29378'. [ 1797.242892][T21423] netlink: 60 bytes leftover after parsing attributes in process `syz.6.29378'. [ 1797.295849][ T4390] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1797.350925][T21410] lo speed is unknown, defaulting to 1000 [ 1797.389044][T21410] lo speed is unknown, defaulting to 1000 [ 1797.397073][T21448] netlink: 'syz.0.29383': attribute type 39 has an invalid length. [ 1797.444151][T21452] netlink: 4 bytes leftover after parsing attributes in process `syz.3.29384'. [ 1797.484331][T21452] hsr_slave_1 (unregistering): left promiscuous mode [ 1797.494010][ T4390] bridge_slave_1: left allmulticast mode [ 1797.499696][ T4390] bridge_slave_1: left promiscuous mode [ 1797.506460][ T4390] bridge0: port 2(bridge_slave_1) entered disabled state [ 1797.515264][ T4390] bridge_slave_0: left allmulticast mode [ 1797.521051][ T4390] bridge_slave_0: left promiscuous mode [ 1797.526796][ T4390] bridge0: port 1(bridge_slave_0) entered disabled state [ 1797.611210][T21457] netlink: 4 bytes leftover after parsing attributes in process `syz.3.29384'. [ 1797.644151][T21460] FAULT_INJECTION: forcing a failure. [ 1797.644151][T21460] name failslab, interval 1, probability 0, space 0, times 0 [ 1797.657538][T21460] CPU: 0 UID: 0 PID: 21460 Comm: syz.1.29386 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1797.657610][T21460] Tainted: [W]=WARN [ 1797.657616][T21460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1797.657665][T21460] Call Trace: [ 1797.657671][T21460] [ 1797.657678][T21460] __dump_stack+0x1d/0x30 [ 1797.657697][T21460] dump_stack_lvl+0xe8/0x140 [ 1797.657715][T21460] dump_stack+0x15/0x1b [ 1797.657730][T21460] should_fail_ex+0x265/0x280 [ 1797.657765][T21460] should_failslab+0x8c/0xb0 [ 1797.657797][T21460] __kvmalloc_node_noprof+0x12e/0x670 [ 1797.657890][T21460] ? bpf_test_run_xdp_live+0xf2/0x1050 [ 1797.657934][T21460] bpf_test_run_xdp_live+0xf2/0x1050 [ 1797.657960][T21460] ? __pfx_autoremove_wake_function+0x10/0x10 [ 1797.658025][T21460] ? 0xffffffffa02054c0 [ 1797.658050][T21460] ? 0xffffffffa02054c0 [ 1797.658062][T21460] ? 0xffffffffa02054c0 [ 1797.658074][T21460] ? bpf_dispatcher_change_prog+0x6ec/0x7f0 [ 1797.658098][T21460] ? 0xffffffffa02054c0 [ 1797.658122][T21460] ? __pfx_xdp_test_run_init_page+0x10/0x10 [ 1797.658156][T21460] bpf_prog_test_run_xdp+0x59a/0x970 [ 1797.658207][T21460] ? __rcu_read_unlock+0x4f/0x70 [ 1797.658241][T21460] ? __pfx_bpf_prog_test_run_xdp+0x10/0x10 [ 1797.658266][T21460] bpf_prog_test_run+0x22a/0x390 [ 1797.658286][T21460] __sys_bpf+0x4c0/0x7c0 [ 1797.658327][T21460] __x64_sys_bpf+0x41/0x50 [ 1797.658372][T21460] x64_sys_call+0x2aee/0x3000 [ 1797.658392][T21460] do_syscall_64+0xd2/0x200 [ 1797.658414][T21460] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1797.658455][T21460] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1797.658477][T21460] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1797.658497][T21460] RIP: 0033:0x7f225e91efc9 [ 1797.658519][T21460] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1797.658545][T21460] RSP: 002b:00007f225d387038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1797.658629][T21460] RAX: ffffffffffffffda RBX: 00007f225eb75fa0 RCX: 00007f225e91efc9 [ 1797.658641][T21460] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 1797.658652][T21460] RBP: 00007f225d387090 R08: 0000000000000000 R09: 0000000000000000 [ 1797.658664][T21460] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1797.658675][T21460] R13: 00007f225eb76038 R14: 00007f225eb75fa0 R15: 00007fffe9ab3558 [ 1797.658694][T21460] [ 1797.912636][T21462] netlink: 'syz.1.29387': attribute type 39 has an invalid length. [ 1797.912791][ T4390] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1797.931731][ T4390] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1797.941843][ T4390] bond0 (unregistering): Released all slaves [ 1798.083107][ T4390] hsr_slave_0: left promiscuous mode [ 1798.089453][ T4390] hsr_slave_1: left promiscuous mode [ 1798.095331][ T4390] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1798.102840][ T4390] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1798.111831][ T4390] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1798.119273][ T4390] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1798.131571][ T4390] veth1_macvtap: left promiscuous mode [ 1798.137130][ T4390] veth0_macvtap: left promiscuous mode [ 1798.143795][ T4390] veth1_vlan: left promiscuous mode [ 1798.149277][ T4390] veth0_vlan: left promiscuous mode [ 1798.331728][ T4390] team0 (unregistering): Port device team_slave_1 removed [ 1798.348241][ T4390] team0 (unregistering): Port device team_slave_0 removed [ 1798.473588][T21410] chnl_net:caif_netlink_parms(): no params data found [ 1798.564642][T21410] bridge0: port 1(bridge_slave_0) entered blocking state [ 1798.571904][T21410] bridge0: port 1(bridge_slave_0) entered disabled state [ 1798.592583][T21410] bridge_slave_0: entered allmulticast mode [ 1798.606713][T21410] bridge_slave_0: entered promiscuous mode [ 1798.624201][T21410] bridge0: port 2(bridge_slave_1) entered blocking state [ 1798.631329][T21410] bridge0: port 2(bridge_slave_1) entered disabled state [ 1798.638835][T21410] bridge_slave_1: entered allmulticast mode [ 1798.646260][T21410] bridge_slave_1: entered promiscuous mode [ 1798.671409][T21410] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1798.695207][T21410] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1798.732424][T21410] team0: Port device team_slave_0 added [ 1798.740098][T21410] team0: Port device team_slave_1 added [ 1798.777410][T21410] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1798.784414][T21410] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1798.810529][T21410] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1798.822942][T21410] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1798.829979][T21410] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1798.856196][T21410] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1798.903830][T21410] hsr_slave_0: entered promiscuous mode [ 1798.919898][T21410] hsr_slave_1: entered promiscuous mode [ 1798.932751][T21410] debugfs: 'hsr0' already exists in 'hsr' [ 1798.938616][T21410] Cannot create hsr debugfs directory [ 1799.182991][T11977] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1799.215947][T21494] loop1: detected capacity change from 0 to 1024 [ 1799.230624][T21494] /dev/loop1: Can't open blockdev [ 1799.245945][T11977] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1799.277575][T21410] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 1799.298533][T11977] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1799.325551][T21410] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 1799.359698][T11977] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1799.393717][T21410] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 1799.421279][T21410] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 1799.475510][T11977] bridge_slave_1: left allmulticast mode [ 1799.481386][T11977] bridge_slave_1: left promiscuous mode [ 1799.487087][T11977] bridge0: port 2(bridge_slave_1) entered disabled state [ 1799.520433][T11977] bridge_slave_0: left promiscuous mode [ 1799.526276][T11977] bridge0: port 1(bridge_slave_0) entered disabled state [ 1799.558510][T21514] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 1799.759906][T11977] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1799.771899][T11977] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1799.782991][T11977] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 1799.794176][T11977] bond0 (unregistering): Released all slaves [ 1799.807154][T21517] FAULT_INJECTION: forcing a failure. [ 1799.807154][T21517] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1799.821190][T21517] CPU: 0 UID: 0 PID: 21517 Comm: syz.0.29404 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1799.821224][T21517] Tainted: [W]=WARN [ 1799.821231][T21517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1799.821245][T21517] Call Trace: [ 1799.821253][T21517] [ 1799.821260][T21517] __dump_stack+0x1d/0x30 [ 1799.821352][T21517] dump_stack_lvl+0xe8/0x140 [ 1799.821375][T21517] dump_stack+0x15/0x1b [ 1799.821392][T21517] should_fail_ex+0x265/0x280 [ 1799.821439][T21517] should_fail_alloc_page+0xf2/0x100 [ 1799.821509][T21517] __alloc_frozen_pages_noprof+0xff/0x360 [ 1799.821580][T21517] alloc_pages_mpol+0xb3/0x260 [ 1799.821608][T21517] alloc_pages_noprof+0x90/0x130 [ 1799.821642][T21517] get_free_pages_noprof+0xc/0x40 [ 1799.821684][T21517] selinux_genfs_get_sid+0x33/0x180 [ 1799.821714][T21517] inode_doinit_with_dentry+0x5fe/0x7a0 [ 1799.821750][T21517] selinux_d_instantiate+0x27/0x40 [ 1799.821787][T21517] security_d_instantiate+0x7a/0xa0 [ 1799.821834][T21517] d_instantiate+0x3f/0x80 [ 1799.821870][T21517] __debugfs_create_file+0x1c1/0x330 [ 1799.821921][T21517] debugfs_create_file_full+0x3f/0x60 [ 1799.821966][T21517] ? __pfx_wg_setup+0x10/0x10 [ 1799.822046][T21517] ref_tracker_dir_debugfs+0x100/0x1e0 [ 1799.822109][T21517] alloc_netdev_mqs+0x1a7/0xa50 [ 1799.822154][T21517] rtnl_create_link+0x239/0x710 [ 1799.822244][T21517] rtnl_newlink_create+0x14c/0x620 [ 1799.822272][T21517] ? __list_del_entry_valid_or_report+0x65/0x130 [ 1799.822311][T21517] ? __mutex_lock+0x25d/0xcc0 [ 1799.822385][T21517] rtnl_newlink+0xf29/0x12d0 [ 1799.822486][T21517] ? xas_load+0x413/0x430 [ 1799.822509][T21517] ? __memcg_slab_free_hook+0x135/0x230 [ 1799.822552][T21517] ? __rcu_read_unlock+0x4f/0x70 [ 1799.822701][T21517] ? avc_has_perm_noaudit+0x1b1/0x200 [ 1799.822787][T21517] ? cred_has_capability+0x210/0x280 [ 1799.822839][T21517] ? selinux_capable+0x31/0x40 [ 1799.822867][T21517] ? security_capable+0x83/0x90 [ 1799.822909][T21517] ? ns_capable+0x7d/0xb0 [ 1799.822944][T21517] ? __pfx_rtnl_newlink+0x10/0x10 [ 1799.822991][T21517] rtnetlink_rcv_msg+0x5fe/0x6d0 [ 1799.823043][T21517] netlink_rcv_skb+0x123/0x220 [ 1799.823241][T21517] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 1799.823372][T21517] rtnetlink_rcv+0x1c/0x30 [ 1799.823415][T21517] netlink_unicast+0x5c0/0x690 [ 1799.823453][T21517] netlink_sendmsg+0x58b/0x6b0 [ 1799.823556][T21517] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1799.823668][T21517] __sock_sendmsg+0x145/0x180 [ 1799.823689][T21517] ____sys_sendmsg+0x31e/0x4e0 [ 1799.823725][T21517] ___sys_sendmsg+0x17b/0x1d0 [ 1799.823814][T21517] __x64_sys_sendmsg+0xd4/0x160 [ 1799.823873][T21517] x64_sys_call+0x191e/0x3000 [ 1799.823904][T21517] do_syscall_64+0xd2/0x200 [ 1799.823937][T21517] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1799.823970][T21517] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1799.824067][T21517] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1799.824093][T21517] RIP: 0033:0x7f9e2afdefc9 [ 1799.824108][T21517] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1799.824142][T21517] RSP: 002b:00007f9e29a3f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1799.824167][T21517] RAX: ffffffffffffffda RBX: 00007f9e2b235fa0 RCX: 00007f9e2afdefc9 [ 1799.824185][T21517] RDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000000000000008 [ 1799.824281][T21517] RBP: 00007f9e29a3f090 R08: 0000000000000000 R09: 0000000000000000 [ 1799.824299][T21517] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1799.824317][T21517] R13: 00007f9e2b236038 R14: 00007f9e2b235fa0 R15: 00007fff179d17e8 [ 1799.824344][T21517] [ 1800.207593][T21517] wireguard0: entered promiscuous mode [ 1800.213127][T21517] wireguard0: entered allmulticast mode [ 1800.229227][T11977] tipc: Left network mode [ 1800.287372][T21496] lo speed is unknown, defaulting to 1000 [ 1800.297510][T11977] hsr_slave_0: left promiscuous mode [ 1800.297564][T21523] FAULT_INJECTION: forcing a failure. [ 1800.297564][T21523] name failslab, interval 1, probability 0, space 0, times 0 [ 1800.297648][T11977] ================================================================== [ 1800.303051][T21523] CPU: 1 UID: 0 PID: 21523 Comm: syz.1.29407 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1800.303098][T21523] Tainted: [W]=WARN [ 1800.303108][T21523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1800.303128][T21523] Call Trace: [ 1800.303138][T21523] [ 1800.303148][T21523] __dump_stack+0x1d/0x30 [ 1800.303176][T21523] dump_stack_lvl+0xe8/0x140 [ 1800.303283][T21523] dump_stack+0x15/0x1b [ 1800.303307][T21523] should_fail_ex+0x265/0x280 [ 1800.303384][T21523] ? alloc_pipe_info+0xae/0x350 [ 1800.303419][T21523] should_failslab+0x8c/0xb0 [ 1800.303534][T21523] __kmalloc_cache_noprof+0x4c/0x4a0 [ 1800.303580][T21523] alloc_pipe_info+0xae/0x350 [ 1800.303616][T21523] splice_direct_to_actor+0x592/0x680 [ 1800.303680][T21523] ? kstrtouint_from_user+0x9f/0xf0 [ 1800.303731][T21523] ? __pfx_direct_splice_actor+0x10/0x10 [ 1800.303761][T21523] ? __rcu_read_unlock+0x4f/0x70 [ 1800.303845][T21523] ? get_pid_task+0x96/0xd0 [ 1800.303876][T21523] ? avc_policy_seqno+0x15/0x30 [ 1800.303992][T21523] ? selinux_file_permission+0x1e4/0x320 [ 1800.304036][T21523] do_splice_direct+0xda/0x150 [ 1800.304066][T21523] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 1800.304140][T21523] do_sendfile+0x380/0x650 [ 1800.304188][T21523] __x64_sys_sendfile64+0x105/0x150 [ 1800.304248][T21523] x64_sys_call+0x2bb4/0x3000 [ 1800.304280][T21523] do_syscall_64+0xd2/0x200 [ 1800.304314][T21523] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1800.304399][T21523] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1800.304477][T21523] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1800.304510][T21523] RIP: 0033:0x7f225e91efc9 [ 1800.304532][T21523] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1800.304558][T21523] RSP: 002b:00007f225d387038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1800.304585][T21523] RAX: ffffffffffffffda RBX: 00007f225eb75fa0 RCX: 00007f225e91efc9 [ 1800.304679][T21523] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000007 [ 1800.304714][T21523] RBP: 00007f225d387090 R08: 0000000000000000 R09: 0000000000000000 [ 1800.304732][T21523] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000000001 [ 1800.304750][T21523] R13: 00007f225eb76038 R14: 00007f225eb75fa0 R15: 00007fffe9ab3558 [ 1800.304784][T21523] [ 1800.313557][T21525] netlink: 'syz.3.29406': attribute type 62 has an invalid length. [ 1800.315540][T11977] BUG: KCSAN: data-race in _prb_read_valid / prb_reserve [ 1800.565781][T11977] [ 1800.568119][T11977] write to 0xffffffff868fd280 of 88 bytes by task 21523 on cpu 1: [ 1800.575962][T11977] prb_reserve+0x695/0xaf0 [ 1800.580400][T11977] vprintk_store+0x56d/0x860 [ 1800.585010][T11977] vprintk_emit+0x10d/0x580 [ 1800.589549][T11977] vprintk_default+0x26/0x30 [ 1800.594156][T11977] vprintk+0x1d/0x30 [ 1800.598289][T11977] _printk+0x79/0xa0 [ 1800.602203][T11977] should_fail_ex+0x24d/0x280 [ 1800.606901][T11977] should_failslab+0x8c/0xb0 [ 1800.611511][T11977] __kmalloc_cache_noprof+0x4c/0x4a0 [ 1800.616822][T11977] alloc_pipe_info+0xae/0x350 [ 1800.621510][T11977] splice_direct_to_actor+0x592/0x680 [ 1800.626916][T11977] do_splice_direct+0xda/0x150 [ 1800.631704][T11977] do_sendfile+0x380/0x650 [ 1800.636150][T11977] __x64_sys_sendfile64+0x105/0x150 [ 1800.641376][T11977] x64_sys_call+0x2bb4/0x3000 [ 1800.646074][T11977] do_syscall_64+0xd2/0x200 [ 1800.650607][T11977] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1800.656626][T11977] [ 1800.659046][T11977] read to 0xffffffff868fd280 of 8 bytes by task 11977 on cpu 0: [ 1800.666682][T11977] _prb_read_valid+0x1c4/0x920 [ 1800.671463][T11977] prb_final_commit+0x136/0x1e0 [ 1800.676344][T11977] vprintk_store+0x741/0x860 [ 1800.681052][T11977] vprintk_emit+0x10d/0x580 [ 1800.685568][T11977] vprintk_default+0x26/0x30 [ 1800.690169][T11977] vprintk+0x1d/0x30 [ 1800.694089][T11977] _printk+0x79/0xa0 [ 1800.698049][T11977] __netdev_printk+0x321/0x3e0 [ 1800.702847][T11977] netdev_info+0x9b/0xd0 [ 1800.707330][T11977] __dev_set_promiscuity+0x233/0x450 [ 1800.712657][T11977] netif_set_promiscuity+0x39/0x90 [ 1800.717789][T11977] dev_set_promiscuity+0xc1/0x170 [ 1800.722826][T11977] hsr_del_port+0x13b/0x1a0 [ 1800.727348][T11977] hsr_del_ports+0x31/0xc0 [ 1800.731775][T11977] hsr_dellink+0x5b/0xa0 [ 1800.736029][T11977] default_device_exit_batch+0x47b/0x560 [ 1800.741674][T11977] ops_undo_list+0x2c0/0x410 [ 1800.746278][T11977] cleanup_net+0x2f4/0x4f0 [ 1800.750703][T11977] process_scheduled_works+0x4ce/0x9d0 [ 1800.756221][T11977] worker_thread+0x582/0x770 [ 1800.760833][T11977] kthread+0x489/0x510 [ 1800.764918][T11977] ret_from_fork+0x122/0x1b0 [ 1800.769520][T11977] ret_from_fork_asm+0x1a/0x30 [ 1800.774304][T11977] [ 1800.776676][T11977] value changed: 0x000000000000b25e -> 0x000000000000d25e [ 1800.783814][T11977] [ 1800.786181][T11977] Reported by Kernel Concurrency Sanitizer on: [ 1800.792344][T11977] CPU: 0 UID: 0 PID: 11977 Comm: kworker/u8:61 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1800.804004][T11977] Tainted: [W]=WARN [ 1800.807813][T11977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1800.817880][T11977] Workqueue: netns cleanup_net [ 1800.822668][T11977] ================================================================== [ 1800.851427][T11977] hsr_slave_1: left promiscuous mode [ 1800.858204][T11977] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1800.865657][T11977] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1800.874943][T11977] veth1_macvtap: left promiscuous mode [ 1800.880435][T11977] veth0_macvtap: left promiscuous mode [ 1800.886671][T11977] veth1_vlan: left promiscuous mode [ 1800.891974][T11977] veth0_vlan: left promiscuous mode [ 1800.936897][T11977] pimreg (unregistering): left allmulticast mode [ 1800.968646][T11977] team0 (unregistering): Port device team_slave_1 removed [ 1800.978680][T11977] team0 (unregistering): Port device team_slave_0 removed [ 1801.014117][T21496] lo speed is unknown, defaulting to 1000 [ 1801.027760][T21410] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1801.046532][T21410] 8021q: adding VLAN 0 to HW filter on device team0 [ 1801.056159][ T7041] bridge0: port 1(bridge_slave_0) entered blocking state [ 1801.063245][ T7041] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1801.078935][ T4390] bridge0: port 2(bridge_slave_1) entered blocking state [ 1801.086174][ T4390] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1801.162256][T21496] chnl_net:caif_netlink_parms(): no params data found [ 1801.208426][T21496] bridge0: port 1(bridge_slave_0) entered blocking state [ 1801.215617][T21496] bridge0: port 1(bridge_slave_0) entered disabled state [ 1801.223811][T21496] bridge_slave_0: entered allmulticast mode [ 1801.230462][T21496] bridge_slave_0: entered promiscuous mode [ 1801.238550][T21496] bridge0: port 2(bridge_slave_1) entered blocking state [ 1801.245875][T21496] bridge0: port 2(bridge_slave_1) entered disabled state [ 1801.254241][T21496] bridge_slave_1: entered allmulticast mode [ 1801.260873][T21496] bridge_slave_1: entered promiscuous mode [ 1801.281102][T21496] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1801.293414][T21496] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1801.315219][T21496] team0: Port device team_slave_0 added [ 1801.323577][T21496] team0: Port device team_slave_1 added [ 1801.341667][T21496] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1801.348748][T21496] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1801.375338][T21496] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1801.387138][T21496] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1801.394099][T21496] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1801.420666][T21496] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1801.433310][T21410] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1801.460073][T21496] hsr_slave_0: entered promiscuous mode [ 1801.466996][T21496] hsr_slave_1: entered promiscuous mode [ 1801.473444][T21496] debugfs: 'hsr0' already exists in 'hsr' [ 1801.479193][T21496] Cannot create hsr debugfs directory [ 1801.597449][T21410] veth0_vlan: entered promiscuous mode [ 1801.605779][T21410] veth1_vlan: entered promiscuous mode [ 1801.622969][T21410] veth0_macvtap: entered promiscuous mode [ 1801.632327][T21410] veth1_macvtap: entered promiscuous mode [ 1801.644050][T21410] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1801.657283][T21410] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1801.668538][T11977] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1801.678051][T11977] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1801.689441][T11977] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1801.704849][T11977] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1801.735541][T21496] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 1801.744856][T21496] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 1801.754065][T21496] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 1801.763292][T21496] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 1801.802358][T21496] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1801.816433][T21496] 8021q: adding VLAN 0 to HW filter on device team0 [ 1801.827611][T11977] bridge0: port 1(bridge_slave_0) entered blocking state [ 1801.834786][T11977] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1801.847228][T11977] bridge0: port 2(bridge_slave_1) entered blocking state [ 1801.854458][T11977] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1801.879147][T21496] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1801.889564][T21496] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1801.946395][T21496] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1802.060791][T21496] veth0_vlan: entered promiscuous mode [ 1802.069102][T21496] veth1_vlan: entered promiscuous mode [ 1802.086752][T21496] veth0_macvtap: entered promiscuous mode [ 1802.094973][T21496] veth1_macvtap: entered promiscuous mode [ 1802.106899][T21496] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1802.118637][T21496] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1802.131038][T11953] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1802.140157][T11953] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1802.153617][T11953] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1802.162462][T11953] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0